Practical exercises using cryptographic software and tools, as well as the TLS and IPsec protocols.
Practical use of GPG
•Ciphers and hashes: Python (PyCryptodome, cryptography), Java (BouncyCastle), OpenSSL
•CrypTool for simulations
•Attacks and cryptanalysis; John the Ripper, Hashcat for hash attacks
•Burp Suite, OWASP ZAP for vulnerability testing
•PKI and certificates: OpenSSL, Keytool for generating X.509 keys and certificates
•Certbot for TLS
•Digital signatures and authentication: Python cryptography, OpenSSL for RSA, HMAC, ECDSA
•Network and Web Security: Wireshark for TLS analysis
•OpenVPN, StrongSwan for VPN/IPsec