CYB607
Applied Cryptography & Data Protection
Course Description
Applied cryptography, key management, data protection, and post-quantum cryptography.
Learning Objectives
Upon successful completion of this course, students will be able to:
- Apply cryptographic mechanisms appropriately
- Design key management strategies
- Evaluate post-quantum cryptography migration considerations
Course Schedule
| Week | Topic |
|---|---|
| 1-4 | Cryptographic Foundations and PKI |
| 5-8 | Secure Protocols and Key Management |
| 9-10 | Quantum Threats and Post-Quantum Cryptography |
| 11-12 | Cryptographic Risk Analysis Project |
Assessment & Grading
| Assessment | Weight |
|---|---|
| Problem Sets | 30% |
| Applied Cryptography Project | 40% |
| Participation | 30% |
Required Textbooks
- Cryptography Engineering and selected NIST standards