Ethical Hacking: Cryptography
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.
Syllabus
Introduction
- Why become an ethical hacker?
- What you should know
- What does cryptography mean?
- Different types of cryptography
- Different types of ciphers
- Symmetric encryption
- Asymmetric encryption
- Mixing asymmetric with symmetric
- Cryptographic hashing
- How they are used
- Trust models
- Summary of exam expectations
- Digital certificates and signing
- Cryptographic key escrow
- Protocols that use cryptography
- Why encrypt your filesystem?
- Types of attacks
- Real-world exploits
- Code-breaking methodologies
- Summary of exam expectations
Taught by
Stephanie Domas
Related Courses
Information Security - Authentication and Access ControlNew York University (NYU) via edX Cryptography from Scratch| Master Cryptography in Java
Udemy Securing Data with Asymmetric Cryptography
Pluralsight Windows Server Network Infrastructure
Microsoft via Microsoft Learn Windows 8: Networking and Security
LinkedIn Learning