![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course covers the learning outcomes and goals of understanding practically-exploitable cryptographic vulnerabilities in Matrix. It teaches the skills of identifying and exploiting cryptographic weaknesses in the Matrix protocol. The teaching method involves lectures and practical demonstrations. The intended audience for this course includes cybersecurity professionals, cryptographers, and individuals interested in understanding cryptographic vulnerabilities.
Syllabus
Practically-Exploitable Cryptographic Vulnerabilities in Matrix
Taught by
IEEE Symposium on Security and Privacy