quanterios
Jetzt starten
Quanterios AcademyCrypto · Foundations

Cryptography Foundations

Read real enterprise cryptography with confidence.

This is the entry point for teams that need more than vocabulary. Learners build a working mental model of modern cryptography, where it lives in production systems, and how weak implementations turn into security, resilience, and regulatory problems.

Course profile
Duration: 6 hours
Format: Self-paced with optional team office hours
Video: 3.5 hours of guided lessons
Labs: 2 labs, 2.5 hours
Credential: Certificate of completion
Included
  • Video lessons with annotated architecture walkthroughs
  • Hands-on CBOM interpretation lab
  • TLS handshake worksheet and remediation checklist
  • Final knowledge check
Who this is for
  • Security analysts moving into cryptographic risk
  • Platform and application engineers
  • Audit and compliance practitioners who need technical fluency
Prerequisites
  • No prior cryptography specialization required
  • Comfort reading system diagrams and basic networking flows
Outcomes

By the end, your team can do the work.

01Explain the role of symmetric, asymmetric, hash, MAC, and AEAD primitives in enterprise systems
02Trace a TLS handshake from client hello to encrypted record with audit-relevant detail
03Read a CBOM entry and identify where weak or deprecated algorithms create exposure
04Spot common enterprise anti-patterns including hard-coded crypto, unmanaged certificates, and fragile dependencies
Detailed syllabus

3 modules, with lesson-by-lesson structure.

01

Module 1, Primitive families in the real world

Build the foundational vocabulary and map each primitive to concrete enterprise use cases.

Video18 min
Why enterprise cryptography fails quietly

How crypto debt accumulates and why teams miss it until audits or incidents.

Video22 min
Symmetric, asymmetric, and hash primitives

The jobs each primitive family does and the trade-offs behind them.

Reading12 min
Authenticated encryption and integrity controls

AEAD, MAC, and what integrity guarantees really mean in production.

Quiz10 min
Primitive-matching quiz

Quick comprehension check on choosing the right primitive for the job.

02

Module 2, TLS and certificate ecosystems

Move from abstract theory into the most visible cryptographic control plane in enterprise systems.

Video24 min
TLS handshake walkthrough

Step-by-step look at handshake flow, key exchange, and record protection.

Video19 min
Certificate chains and trust stores

How certificate ecosystems are built, delegated, and broken.

Lab35 min
Misconfiguration patterns

Diagnose weak cipher suites, poor certificate hygiene, and brittle config choices.

03

Module 3, Enterprise crypto risk in context

Learn where cryptographic weakness hides across cloud, application, device, and industrial environments.

Video20 min
Where weak crypto hides

Applications, appliances, embedded devices, and third-party dependencies.

Reading14 min
Audit triggers and regulator expectations

What auditors and regulators usually look for first.

Lab55 min
CBOM analysis lab

Review a sample CBOM, classify risk, and document first remediation priorities.

Assessment25 min
Foundations assessment

Capstone check for baseline technical fluency.

Labs and assessment
Assessment model
  • Module quizzes after each learning block
  • CBOM interpretation lab submission
  • Final 25-question assessment
Tools and artifacts
  • CBOM examples
  • TLS trace examples
  • Reference remediation worksheet
Enterprise fit
Certificate of completion

Ideal for onboarding customer security teams, audit stakeholders, and platform engineers before rollout of Quanterios Crypto or any crypto modernization program.

Move from interest to enrollment.

Recommended next steps after this course include crypto-posture, pqc-migration.