YoVDO

Ethical Hacking: Cryptography

Offered By: LinkedIn Learning

Tags

Cryptography Courses Ethical Hacking Courses Symmetric Encryption Courses Asymmetric Encryption Courses Digital Certificates Courses Hashing Courses Public Key Infrastructure Courses PKI Courses

Course Description

Overview

Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.

Syllabus

Introduction
  • Why become an ethical hacker?
  • What you should know
1. Cryptography Basics
  • What does cryptography mean?
  • Different types of cryptography
2. Ciphers
  • Different types of ciphers
  • Symmetric encryption
  • Asymmetric encryption
  • Mixing asymmetric with symmetric
3. Hashing
  • Cryptographic hashing
4. Digital Certificates
  • How they are used
  • Trust models
5. Public Key Infrastructure (PKI)
  • Summary of exam expectations
  • Digital certificates and signing
  • Cryptographic key escrow
6. Applied Uses of Cryptography
  • Protocols that use cryptography
  • Why encrypt your filesystem?
7. Cryptographic Attacks
  • Types of attacks
  • Real-world exploits
  • Code-breaking methodologies
Conclusion
  • Summary of exam expectations

Taught by

Stephanie Domas

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera