SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Seminar on Contemporary Cryptography –
                                        Get comprehensive Cryptography-know-how in just one week!
© 2009 InfoGuard | 091113_IG_CCC_A5_e




                                                                            Introduced by your trusted security partner.
Education in information security –
made in Switzerland.
Education Services
                       Contemporary Cryptography – Fundamentals and Applications



                       Cryptography is a core security technology with many
                       applications in communications and information sys-
                       tems, electronic commerce and e-government in the
                       emerging information society. Today every IT-professional
                       needs basic knowledge in cryptography. This seminar
                       provides an in-depth coverage of cryptography from a
                       conceptual and application-oriented point of view. At
                       the same time, the mathematical algorithmic and proto-
                       col aspects are explained without necessarily requiring a
                       deep background in mathematics.




www.infoguard.ch / crypto                                                          Contemporary Cryptography | Page 1
Seminar on Contemporary Cryptography




Crypto AG and its sister company InfoGuard AG            Seminar dates
have jointly developed a 5 day education pro-            The seminar dates can be found on the enclosed book-
gramme for the needs of governmental information         ing form or on our website: www.infoguard.ch/crypto/
security professionals.
                                                         Seminar language
Who should attend                                        English
Delegates from government and defence entities who
are responsible for initiating, implementing and main-   Seminar location
taining information security in their organisation.      InfoGuard AG education centre, Zug/Switzerland.

The seminar is open to everyone. On request it can be    Seminar Certificate
conducted as a private seminar on a date mutually        Each participant becomes an InfoGuard Contemporary
agreeable. Please ask for further information.           Cryptography Expert, and is awarded a formal certifi-
                                                         cate.




Page 2 | Contemporary Cryptography                                                                               www.infoguard.ch / crypto
Participants will receive introduction on all relevant topics with
                       regard to a holistic approach to Contemporary Cryptography.



                       Introduction and Overview                                   not shared among the parties involved. More specifically,
                       The seminar starts with a general introduction to crypto-   it addresses one-way functions, asymmetric encryption
                       logy. Different notions of security are introduced and      systems, such as RSA, ElGamal, cryptographic hash func-
                       various classes of cryptographic systems (cryptosystems)    tions, such as MD5 and SHA-1 and digital signature sys-
                       are overviewed, discussed and put into perspective on a     tems. The module also elaborates on the fundamentals
                       high level of abstraction. This module prepares the         and basic principles of elliptic curve cryptography (ECC).
                       grounds for the rest of the course.
                                                                                   Crypto Security Architecture
                       Secret Key Cryptography                                     This module presents in particular the Crypto Security
                       This module elaborates on secret key cryptography, i.e.,    Philosophy and Architecture. It helps participants to
                       cryptosystems that employ secret parameters that are        understand on how cryptography is being used in differ-
                       shared among the parties involved. More specifically, it    ent security solutions.
                       addresses symmetric encryption systems, such as the
                                                                                   Key Management and Applications
                       Data Encryption Standard (DES), the Advanced Encryp-
                                                                                   This module elaborates on key management (i.e., key
                       tion Standard (AES), and the stream cipher RC4, mes-
                                                                                   distribution and key establishment), public key infra-
                       sage authentication systems, such as the HMAC con-
                                                                                   structure (PKI), quantum cryptography, and cryptograph-
                       struction, random and pseudorandom bit generators, as
                                                                                   ic applications. Such applications include entity authenti-
                       well as random and pseudorandom functions.
                                                                                   cation and secure multi-party computation, as well as
                       Public Key Cryptography                                     more timely applications, such as Internet banking,
                       This module elaborates on public key cryptography, i.e.,    e-government Internet voting and electronic payment
                       cryptosystems that employ secret parameters that are        systems.

www.infoguard.ch / crypto                                                                                Contemporary Cryptography | Page 3
Seminar Agenda




Arrival

Introduction and Overview


                                     DAY 1
Secret Key Cryptography


                                     DAY 2
Public Key Cryptography


                                     DAY 3
Crypto Security Architecture


                                     DAY 4
Key Management
and Applications

                                     DAY 5
Departure

Page 4 | Contemporary Cryptography           www.infoguard.ch / crypto
Days 1                                 Day 2                                 Day 4
                       Introduction and Overview              Secret Key Cryptography               Crypto Security Architecture
                       • Cryptology                           • Symmetric encryption systems        • Crypto Security Philosophy
                       • Notions of security (unconditional     (e.g., DES, AES, RC4, ... )         • Crypto Security Architecture
                         vs. conditional security)            • Message authentication systems      • Security solutions
                       • Cryptographic systems (classifica-     (e.g., HMAC construction)
                         tion and overview)                   • Random and pseudorandom bit         Day 5
                         · Unkeyed cryptosystems                generators                          Key Management and
                         · Secret key cryptosystems           • Random and Pseudorandom func-       Applications
                         · Public key cryptosystems             tions                               • Key management
                                                                                                    • Public key infrastructure (PKI)
                                                              Day 3                                 • Quantum cryptography
                                                              Public Key Cryptography               • Cryptographic applications
                                                              • One-way functions                     · Entity authentication
                                                              • Asymmetric encryption systems         · Secure multi-party computation
                                                                (e.g., RSA, ElGamal, Rabin, ... )     · Internet banking
                                                              • Cryptographic hash functions          · Remote Internet voting
                                                                (e.g., MD5, SHA-1, ... )              · Electronic payment systems
                                                              • Digital signature systems
                                                              • Elliptic curve cryptography (ECC)



www.infoguard.ch / crypto                                                                            Contemporary Cryptography | Page 5
Seminar environment




                                     Tutors
                                     The skill transfer is of high quality, both in terms of
                                     subject matter and tuition. In addition to their technical
                                     or scientific background, the tutors have many years of
                                     practical experience in their specialist fields with regard
                                     to information security and other ICT related areas. Their
                                     extensive social and cultural skills guarantee a congenial
                                     learning environment.

                                     Seminar methodology
                                     The seminar consists of know-how transfer sessions and
                                     discussions.

                                     Daily schedule
                                     5 days              Morning    9.00 – 12.00 h
                                     Monday to Friday    Lunch     12.00 – 13.30 h
                                                         Afternoon 13.30 – 16.30 h
                                     Accommodation
                                     Hotel booking can be arranged on request.




Page 6 | Contemporary Cryptography                                                            www.infoguard.ch / crypto
Terms and conditions




                       Registration                                                     Alterations
                       Please complete the registration form enclosed or online on      • InfoGuard AG reserves the right to cancel the seminar due
                       our website www.infoguard.ch/crypto and fax to                     to an insufficient number of registrations. In such cases,
                       +41 41 749 19 10 or mail to info@infoguard.com.                    any registration fees already paid will be fully refunded.
                       Your registration will be confirmed in writing.                  • It may become necessary for us to make alterations to the
                                                                                          content, speakers, timing, venue or date of the event
                       Cancellation                                                       compared to the advertised programme.
                       • All cancellations must be submitted in writing.
                       • Up to two weeks before the start of the seminar, 25% of        Terms of Payment
                         the registration fee will be charged for administration.       • Payments are due within 10 days of the invoice date and
                       • Up to one week before the start of the seminar, 50% of           not later than the start of the seminar.
                         the registration fee will be charged.                          • In the event of a registration at short notice, i.e. within
                       • In the week before the start of the seminar, the full regis-     one week, the person participating in the seminar may be
                         tration fee will be charged.                                     required to submit proof of payment or to pay cash prior
                       • No charge will be made if another person participates in         to the seminar start.
                         the seminar on behalf of the absent participant.
                                                                                        Place of Jurisdiction
                       Substitutions/Name Changes                                       • The place of jurisdiction is Zug, Switzerland
                       If you are unable to attend you may nominate, in writing,
                       another participant to take your place at any time prior to
                       the start of the seminar. Two ore more participants may not
                       «share» a place at a seminar. Please make separate bookings
                       for each participant.

www.infoguard.ch / crypto                                                                                       Contemporary Cryptography | Page 7
Enjoy your stay in Switzerland




Your stay in Switzerland will be care-                                            InfoGuard AG – Education in in-
fully prepared. Learning will be made                                             formation security «Made in
much easier thanks to a pleasant                                                  Switzerland».
atmosphere and interesting, exciting                                              InfoGuard AG is the preferred edu-
leisure time. During this five day                                                cation provider for information secu-
seminar we will organize a cultural                                               rity. Its courses are geared to the
outing.                                                                           needs of governmental and military
                                                                                  organizations as well as public ad-
The small but lively town of Zug                                                  ministrations.
(22’000 inhabitants) benefits from
being close to the Swiss business                                                 Crypto AG – To Remain
metropolis of Zurich and its interna-                                             Sovereign.
tional airport, which is 35 kilometers                                            We have developed, manufactured
away. It is situated right by Lake Zug,                                           and implemented custom security
                                                           Basel
and surrounded by typical Swiss hills                                 Zurich
                                                                     Zug
                                                                                  solutions for over 55 years. You too
and mountains. The region is an                    Berne
                                                               Lucerne
                                                                                  can rely on the expertise and capa-
excellent starting point for excur-       Geneva                                  bilities of Crypto AG – just like our
sions to the country’s most interest-                                    Lugano
                                                                                  customers in over 130 countries.
ing tourist attractions.




Page 8 | Contemporary Cryptography                                                                www.infoguard.ch / crypto
Designed and given      InfoGuard AG              Introduced by your          Crypto AG
by the sister company   Feldstrasse 1             trusted security partner:   P.O. Box 460
of Crypto AG:           CH-6300 Zug                                           CH-6301 Zug/Switzerland
                        Switzerland                                           Phone +41 41 749 77 22
                        Phone +41 41 749 19 00                                Fax +41 41 741 22 72
                        Fax +41 41 749 19 10                                  crypto@crypto.ch
                        info@infoguard.com                                    www.crypto.ch
                        www.infoguard.ch/crypto
© 2009 InfoGuard | 091113_IG_CCC_A5_e
A M E M B E R O F « T H E C RY P T O G R O U P »

Más contenido relacionado

La actualidad más candente

A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report cryptoGaurav Shukla
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric keyRajat Tripathi
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
Cryptography al-hamadi111
Cryptography al-hamadi111Cryptography al-hamadi111
Cryptography al-hamadi111sukhalalton
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemEditor IJMTER
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 

La actualidad más candente (18)

A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
 
SmartContent: A self protecting and context aware active content
SmartContent: A self protecting and context aware active contentSmartContent: A self protecting and context aware active content
SmartContent: A self protecting and context aware active content
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Cryptography al-hamadi111
Cryptography al-hamadi111Cryptography al-hamadi111
Cryptography al-hamadi111
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
H42063743
H42063743H42063743
H42063743
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 

Destacado

Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlusLee Dalton
 
Top 10 Internet Trends 2006
Top 10 Internet Trends 2006Top 10 Internet Trends 2006
Top 10 Internet Trends 2006Jürg Stuker
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Secure Optical Connectivity Solutions for High-Capacity Data Centers
Secure Optical Connectivity Solutions for High-Capacity Data CentersSecure Optical Connectivity Solutions for High-Capacity Data Centers
Secure Optical Connectivity Solutions for High-Capacity Data CentersADVA
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceSoftchoice Corporation
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Sophos Benelux
 
Telecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul SynchronizationTelecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul SynchronizationADVA
 
IDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthIDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthKen Tulegenov
 
Next-Generation Access/Backhaul based on ITU G.989, NG-PON2
Next-Generation Access/Backhaul based on ITU G.989, NG-PON2Next-Generation Access/Backhaul based on ITU G.989, NG-PON2
Next-Generation Access/Backhaul based on ITU G.989, NG-PON2ADVA
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
Sophos Endpoint 10 - Saldit Software
Sophos Endpoint 10 - Saldit SoftwareSophos Endpoint 10 - Saldit Software
Sophos Endpoint 10 - Saldit SoftwareSaldit Software
 
Understanding Revolutionary Technology in Today's Data Security Environment
Understanding Revolutionary Technology in Today's Data Security EnvironmentUnderstanding Revolutionary Technology in Today's Data Security Environment
Understanding Revolutionary Technology in Today's Data Security EnvironmentProtegrity
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 

Destacado (20)

Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlus
 
Top 10 Internet Trends 2006
Top 10 Internet Trends 2006Top 10 Internet Trends 2006
Top 10 Internet Trends 2006
 
Guard me
Guard meGuard me
Guard me
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
Panorama aquaviario
Panorama aquaviarioPanorama aquaviario
Panorama aquaviario
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Secure Optical Connectivity Solutions for High-Capacity Data Centers
Secure Optical Connectivity Solutions for High-Capacity Data CentersSecure Optical Connectivity Solutions for High-Capacity Data Centers
Secure Optical Connectivity Solutions for High-Capacity Data Centers
 
Complete Security with Sophos and Softchoice
Complete Security with Sophos and SoftchoiceComplete Security with Sophos and Softchoice
Complete Security with Sophos and Softchoice
 
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
Telecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul SynchronizationTelecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
 
Netcat - 101 Swiss Army Knife
Netcat - 101 Swiss Army KnifeNetcat - 101 Swiss Army Knife
Netcat - 101 Swiss Army Knife
 
IDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthIDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in Depth
 
Next-Generation Access/Backhaul based on ITU G.989, NG-PON2
Next-Generation Access/Backhaul based on ITU G.989, NG-PON2Next-Generation Access/Backhaul based on ITU G.989, NG-PON2
Next-Generation Access/Backhaul based on ITU G.989, NG-PON2
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Sophos Endpoint 10 - Saldit Software
Sophos Endpoint 10 - Saldit SoftwareSophos Endpoint 10 - Saldit Software
Sophos Endpoint 10 - Saldit Software
 
Understanding Revolutionary Technology in Today's Data Security Environment
Understanding Revolutionary Technology in Today's Data Security EnvironmentUnderstanding Revolutionary Technology in Today's Data Security Environment
Understanding Revolutionary Technology in Today's Data Security Environment
 
Sophos UTM9
Sophos UTM9Sophos UTM9
Sophos UTM9
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 

Similar a Ccc brochure

Cryptography Training Level 1 : Tonex Training
Cryptography Training Level 1 : Tonex TrainingCryptography Training Level 1 : Tonex Training
Cryptography Training Level 1 : Tonex TrainingBryan Len
 
Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Bryan Len
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdfWINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdfsadinenitejaswi23cse
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017FRSecure
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 

Similar a Ccc brochure (17)

L017136269
L017136269L017136269
L017136269
 
Cryptography Training Level 1 : Tonex Training
Cryptography Training Level 1 : Tonex TrainingCryptography Training Level 1 : Tonex Training
Cryptography Training Level 1 : Tonex Training
 
Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1Introduction to Cryptography Training – Level 1
Introduction to Cryptography Training – Level 1
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
 
cryptography
cryptographycryptography
cryptography
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdfWINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 

Más de Ehab El Barbary

Más de Ehab El Barbary (20)

Train the trainer attendance certificate
Train the trainer attendance certificateTrain the trainer attendance certificate
Train the trainer attendance certificate
 
Train the trainer-pass certificate
Train the trainer-pass certificateTrain the trainer-pass certificate
Train the trainer-pass certificate
 
Fire extinguisher training
Fire extinguisher trainingFire extinguisher training
Fire extinguisher training
 
Fire pumps
Fire pumpsFire pumps
Fire pumps
 
Fire life
Fire lifeFire life
Fire life
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 
Customer services.
Customer services.Customer services.
Customer services.
 
Criss mangment
Criss mangmentCriss mangment
Criss mangment
 
Contents administration & general
Contents   administration & generalContents   administration & general
Contents administration & general
 
Certficate
CertficateCertficate
Certficate
 
Building evac flow chart
Building evac flow chartBuilding evac flow chart
Building evac flow chart
 
Bomb threatmanagement
Bomb threatmanagementBomb threatmanagement
Bomb threatmanagement
 
Atf bomb threats
Atf bomb threatsAtf bomb threats
Atf bomb threats
 
Appendix a.7.6 type 2 fire system drill report code2 chi spa
Appendix a.7.6 type 2 fire system drill report code2 chi spaAppendix a.7.6 type 2 fire system drill report code2 chi spa
Appendix a.7.6 type 2 fire system drill report code2 chi spa
 
Apartment patrol scan last
Apartment patrol scan lastApartment patrol scan last
Apartment patrol scan last
 
Alert levels to staff bomb threat.doc11
Alert levels   to staff bomb threat.doc11Alert levels   to staff bomb threat.doc11
Alert levels to staff bomb threat.doc11
 
Action plan for the new cctv operators
Action plan for the new cctv operatorsAction plan for the new cctv operators
Action plan for the new cctv operators
 
Action plan for ss
Action plan for ssAction plan for ss
Action plan for ss
 
Accidenclub car
Accidenclub carAccidenclub car
Accidenclub car
 
444444444444
444444444444444444444444
444444444444
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Ccc brochure

  • 1. Seminar on Contemporary Cryptography – Get comprehensive Cryptography-know-how in just one week! © 2009 InfoGuard | 091113_IG_CCC_A5_e Introduced by your trusted security partner.
  • 2. Education in information security – made in Switzerland.
  • 3. Education Services Contemporary Cryptography – Fundamentals and Applications Cryptography is a core security technology with many applications in communications and information sys- tems, electronic commerce and e-government in the emerging information society. Today every IT-professional needs basic knowledge in cryptography. This seminar provides an in-depth coverage of cryptography from a conceptual and application-oriented point of view. At the same time, the mathematical algorithmic and proto- col aspects are explained without necessarily requiring a deep background in mathematics. www.infoguard.ch / crypto Contemporary Cryptography | Page 1
  • 4. Seminar on Contemporary Cryptography Crypto AG and its sister company InfoGuard AG Seminar dates have jointly developed a 5 day education pro- The seminar dates can be found on the enclosed book- gramme for the needs of governmental information ing form or on our website: www.infoguard.ch/crypto/ security professionals. Seminar language Who should attend English Delegates from government and defence entities who are responsible for initiating, implementing and main- Seminar location taining information security in their organisation. InfoGuard AG education centre, Zug/Switzerland. The seminar is open to everyone. On request it can be Seminar Certificate conducted as a private seminar on a date mutually Each participant becomes an InfoGuard Contemporary agreeable. Please ask for further information. Cryptography Expert, and is awarded a formal certifi- cate. Page 2 | Contemporary Cryptography www.infoguard.ch / crypto
  • 5. Participants will receive introduction on all relevant topics with regard to a holistic approach to Contemporary Cryptography. Introduction and Overview not shared among the parties involved. More specifically, The seminar starts with a general introduction to crypto- it addresses one-way functions, asymmetric encryption logy. Different notions of security are introduced and systems, such as RSA, ElGamal, cryptographic hash func- various classes of cryptographic systems (cryptosystems) tions, such as MD5 and SHA-1 and digital signature sys- are overviewed, discussed and put into perspective on a tems. The module also elaborates on the fundamentals high level of abstraction. This module prepares the and basic principles of elliptic curve cryptography (ECC). grounds for the rest of the course. Crypto Security Architecture Secret Key Cryptography This module presents in particular the Crypto Security This module elaborates on secret key cryptography, i.e., Philosophy and Architecture. It helps participants to cryptosystems that employ secret parameters that are understand on how cryptography is being used in differ- shared among the parties involved. More specifically, it ent security solutions. addresses symmetric encryption systems, such as the Key Management and Applications Data Encryption Standard (DES), the Advanced Encryp- This module elaborates on key management (i.e., key tion Standard (AES), and the stream cipher RC4, mes- distribution and key establishment), public key infra- sage authentication systems, such as the HMAC con- structure (PKI), quantum cryptography, and cryptograph- struction, random and pseudorandom bit generators, as ic applications. Such applications include entity authenti- well as random and pseudorandom functions. cation and secure multi-party computation, as well as Public Key Cryptography more timely applications, such as Internet banking, This module elaborates on public key cryptography, i.e., e-government Internet voting and electronic payment cryptosystems that employ secret parameters that are systems. www.infoguard.ch / crypto Contemporary Cryptography | Page 3
  • 6. Seminar Agenda Arrival Introduction and Overview DAY 1 Secret Key Cryptography DAY 2 Public Key Cryptography DAY 3 Crypto Security Architecture DAY 4 Key Management and Applications DAY 5 Departure Page 4 | Contemporary Cryptography www.infoguard.ch / crypto
  • 7. Days 1 Day 2 Day 4 Introduction and Overview Secret Key Cryptography Crypto Security Architecture • Cryptology • Symmetric encryption systems • Crypto Security Philosophy • Notions of security (unconditional (e.g., DES, AES, RC4, ... ) • Crypto Security Architecture vs. conditional security) • Message authentication systems • Security solutions • Cryptographic systems (classifica- (e.g., HMAC construction) tion and overview) • Random and pseudorandom bit Day 5 · Unkeyed cryptosystems generators Key Management and · Secret key cryptosystems • Random and Pseudorandom func- Applications · Public key cryptosystems tions • Key management • Public key infrastructure (PKI) Day 3 • Quantum cryptography Public Key Cryptography • Cryptographic applications • One-way functions · Entity authentication • Asymmetric encryption systems · Secure multi-party computation (e.g., RSA, ElGamal, Rabin, ... ) · Internet banking • Cryptographic hash functions · Remote Internet voting (e.g., MD5, SHA-1, ... ) · Electronic payment systems • Digital signature systems • Elliptic curve cryptography (ECC) www.infoguard.ch / crypto Contemporary Cryptography | Page 5
  • 8. Seminar environment Tutors The skill transfer is of high quality, both in terms of subject matter and tuition. In addition to their technical or scientific background, the tutors have many years of practical experience in their specialist fields with regard to information security and other ICT related areas. Their extensive social and cultural skills guarantee a congenial learning environment. Seminar methodology The seminar consists of know-how transfer sessions and discussions. Daily schedule 5 days Morning 9.00 – 12.00 h Monday to Friday Lunch 12.00 – 13.30 h Afternoon 13.30 – 16.30 h Accommodation Hotel booking can be arranged on request. Page 6 | Contemporary Cryptography www.infoguard.ch / crypto
  • 9. Terms and conditions Registration Alterations Please complete the registration form enclosed or online on • InfoGuard AG reserves the right to cancel the seminar due our website www.infoguard.ch/crypto and fax to to an insufficient number of registrations. In such cases, +41 41 749 19 10 or mail to info@infoguard.com. any registration fees already paid will be fully refunded. Your registration will be confirmed in writing. • It may become necessary for us to make alterations to the content, speakers, timing, venue or date of the event Cancellation compared to the advertised programme. • All cancellations must be submitted in writing. • Up to two weeks before the start of the seminar, 25% of Terms of Payment the registration fee will be charged for administration. • Payments are due within 10 days of the invoice date and • Up to one week before the start of the seminar, 50% of not later than the start of the seminar. the registration fee will be charged. • In the event of a registration at short notice, i.e. within • In the week before the start of the seminar, the full regis- one week, the person participating in the seminar may be tration fee will be charged. required to submit proof of payment or to pay cash prior • No charge will be made if another person participates in to the seminar start. the seminar on behalf of the absent participant. Place of Jurisdiction Substitutions/Name Changes • The place of jurisdiction is Zug, Switzerland If you are unable to attend you may nominate, in writing, another participant to take your place at any time prior to the start of the seminar. Two ore more participants may not «share» a place at a seminar. Please make separate bookings for each participant. www.infoguard.ch / crypto Contemporary Cryptography | Page 7
  • 10. Enjoy your stay in Switzerland Your stay in Switzerland will be care- InfoGuard AG – Education in in- fully prepared. Learning will be made formation security «Made in much easier thanks to a pleasant Switzerland». atmosphere and interesting, exciting InfoGuard AG is the preferred edu- leisure time. During this five day cation provider for information secu- seminar we will organize a cultural rity. Its courses are geared to the outing. needs of governmental and military organizations as well as public ad- The small but lively town of Zug ministrations. (22’000 inhabitants) benefits from being close to the Swiss business Crypto AG – To Remain metropolis of Zurich and its interna- Sovereign. tional airport, which is 35 kilometers We have developed, manufactured away. It is situated right by Lake Zug, and implemented custom security Basel and surrounded by typical Swiss hills Zurich Zug solutions for over 55 years. You too and mountains. The region is an Berne Lucerne can rely on the expertise and capa- excellent starting point for excur- Geneva bilities of Crypto AG – just like our sions to the country’s most interest- Lugano customers in over 130 countries. ing tourist attractions. Page 8 | Contemporary Cryptography www.infoguard.ch / crypto
  • 11. Designed and given InfoGuard AG Introduced by your Crypto AG by the sister company Feldstrasse 1 trusted security partner: P.O. Box 460 of Crypto AG: CH-6300 Zug CH-6301 Zug/Switzerland Switzerland Phone +41 41 749 77 22 Phone +41 41 749 19 00 Fax +41 41 741 22 72 Fax +41 41 749 19 10 crypto@crypto.ch info@infoguard.com www.crypto.ch www.infoguard.ch/crypto
  • 12. © 2009 InfoGuard | 091113_IG_CCC_A5_e A M E M B E R O F « T H E C RY P T O G R O U P »