EM307 Cryptography

Duration: 5 days

Get Quote


Many aspects of data security today rely on some forms of cryptographic algorithms, making it very important to understand the concepts and details behind the specific cryptographic algorithms that are being used. In this module, we will look at the foundations of cryptography, the different algorithms and approaches, and will attempt to achieve deeper understanding on how the algorithms work and how they can be used to perform specific tasks. At the end of this module, the attendees are expected to know not only what algorithms to use and where, but to also be able to understand why, and with what kinds of risks, if any.


Emerge Trainings acknowledges your hard work. All participants that complete this training receive a Certificate of Completion. Depending on the training solution that your company has selected, morning and afternoon snacks, lunch, cloud servers, student manuals and venue may also be included.

The inclusions may vary for public and private training runs.

Training Venue

All Emerge trainings can be conducted in different locations globally.

For public trainings, the venue details will be included in the announcement for the training run. The training venue could be in Emerge Training rooms, shared facilities, hotels, conference rooms, event places, academic computer rooms and/or other similar venues.

For private trainings, the venue will depend on the company’s preference. Companies may choose hotels, event places, on-premise training rooms and conference rooms. Trainings could also be conducted in a virtual classroom.