IT46 delivers theoretical and hands-on training in the areas of Internet infrastructure and services including wireless networks, IP telephony, security in computer networks and localization of computer software.
For example, our training covers popular topics as: fighting unsolicited mail, developing VoIP infrastructure, setting up a wireless internet service provider, translation of software to local languages, optimizing bandwidth in satellite networks, or security and privacy in online applications.
The modular design of all the courses allow us to adapt our training to the very local conditions of the recipients. Courses vary from one day to several weeks. Theoretical participatory lectures are always combined with field work.
Our business model is based on the principle of giving away all training materials for free to the community. By doing so, we allow our trainees to use the materials to train others. This model has probed to guarantee enough requests from our clients for our face-to-face and on the field training.
All the materials are delivered under a variant of the Creative Commons License.
View all courses conducted by IT46
Breaking Secure Communication Systems: The History of ObsecurityStockholm, Sweden, 1 Jul 2004 What are the main flaws in the design of former and existing IT systems? The lectures gave both theoretical and very practical examples of how and why certain design decisions were taken in some of the well known areas, such as authentication systems, biometrics, secure hardware design, TV/DVD encryption and interception systems. The course focused not only on the technical aspects, but also some important legal and policy issues around technical decisions.i.e. data protection, cybercrime and intellectual property law.
Internet Security and PrivacyStockholm, Sweden, 1 Dec 2003 The course intends to provide a deep understandning of the main concepts behind most of the Internet security protocols. The course gives practical and theoretical knowledge concerning the design decisions taken in some of the well known security standards as IPsec, Kerberos, Secure Socket Layer (SSL) or Public Key Infrastructure (PKI). The emphasis is on cryptography, authentication systems and security attacks so that someone designing a protocol can specifically check for security flaws.
For example, after talking the course you should be able to understand the security uses of secret and public key cryptography, how the advanced encryption standard (AES) works or the principles behind the design of Pretty Good Privacy (PGP) mail encryption.
The last part of the course will cover areas as viruses and computer trojans, intrusion detection systems or data protection policies and European Union regulations. Syllabus
The course is divided in five blocks
- Part1 - Cryptography: Public and Secret Key Cryptography, Hash and Message Digest, Modes of operation.
- Part2 - Authentication: On-line passwords, Authentication Tokens, Biometrics, Certification Authorities, Strong password protocols.
- Part3 - Security Standards: Kerberos V4 and V5, Public Key Infrastructure (PKI), Real Time Security, IPSec (AH, ESP and IKE), Secure Socket Layer (SSL/TLS).
- Part4 - Electronic Mail and Web Security: Pretty Good Privacy (PGP, GPG), Cookies and Platform for Privacy Preferences (P3P)
- Part5 - Leftovers: Firewalls, Intrusion Detection Systems (IDS), Viruses and worms, Data Protection Regulations including PUL and 2002/58/EC.
Wireless and Mobile Network Architectures (VT2002, 2G1330 KTH Course), Bluetooth Profiles Lecture (Invited Speaker)Stockholm, Sweden, 13 Mar 2002 2G1330 Wireless and Mobile Network Architectures is a 5 point course designed for advanced undergraduates and graduate students; especially those in the Telecommunication Graduate Program or the International Masters Wireless program. The document includes the slides of the lecture "Bluetooth Profiles"