Description

Confidentiality, integrity, availability, authentication, authorization, and accountability are the most critical security requirements that serve as the basis for deploying and delivering trustworthy I.T. applications and services in enterprises, mobile devices, and via Cloud providers. Adopting cryptography and identity management techniques addresses those security requirements and has become vital to all business applications and electronic transactions. This course provides the ground-up coverage on the high-level concepts, applied mechanisms, architecture, and real-world implementation practices of using cryptography and identity management techniques applied to Blockchain and Cloud hosted applications and services.The course will examine the fundamentals of cryptography, access control principles, identity management and assurance strategies applied to I.T. applications and Cloud infrastructure based services, the use of cryptographic algorithms, mechanisms, and applied technologies intended for encrypting data in transit, use, and at rest, managing cryptographic key operations lifecycle, private blockchain infrastructures (Ethereum/Hyperledger Fabric), integrating public-key infrastructures and certificate authorities, verifying and validating personal, device and host identities with digital signatures, creating directory services, enabling single sign-on authentication, enforcing access control and authorization policies in I.T. resources, monitoring, logging and recording audit trails and leading to meet compliance with industry and regulatory mandates.

Lecture Hours: 3.00 Lab Hours: 0Total Hours: 3.00