This is an exercise-based course that explores the concepts and methods necessary for successful encryption and decryption of various types of content, and also the successful authentication of different users to different types of systems. Modify as necessary...
- Course Objectives
To provide an introduction to encryption and [identity] authentication, identify their benefits and drawbacks, provide examples of current use, and how they might develop in the future.
- Audience
Nerds, people paranoid about secrecy and privacy, most government departments.
- Prerequisites
An interest in geeky things. A certain level of paranoia is a benefit but not required.
- Explain what it is and why it might be important.
- Maybe explain the difference between authentication and authorization.
- Are you really you?
- What happens if somebody steals "you" - Identity Theft
- Use your imagination and add a topic or two.
- Questions here
- At least one quiz question each
- No more than two multiple-choice questions
- Multi-factor Auth
- Bio-auth
- Think of something futuristic?
Leave this blank. The authors can fill it in from start to finish.
- Explain what encryption is, assuming most people know nothing.
- Explain what it is not, just to set some boundaries.
- Discuss and dispel some myths about encryption.
- Discuss strong versus weak encryption.
- Add another topic here.
- At least four good questions.
- At least one question per writer.
- No more than two multi-choice.
- Some things are good.
- Maybe some things are not so good.
- Try not to get too political.
- At least four good questions.
- At least one question per writer.
- No more than two multi-choice.
- Use your imagination.
- Find at least three dissimilar examples.
- Make sure you include something you can use in a GE.
- At least four good questions.
- At least one question per writer.
- No more than two multi-choice.
(do we need this?)
Where will we be in 5, 10, 20 years? Where were we 5, 10, 20 years ago, just for comparison?
- Leave this blank. The authors should do this from start to finish.
-
List some auth models
-
Describe simple and complex auth
-
List some different types of encryption
-
Do some examples of encrypting and decrypting
-
Demonstrate two encryption tools
-
Hacking and cracking: Can people get around encryption?