YoVDO

Ethical Hacking: Cryptography

Offered By: LinkedIn Learning

Tags

Cryptography Courses Ethical Hacking Courses Symmetric Encryption Courses Asymmetric Encryption Courses Digital Certificates Courses Hashing Courses Public Key Infrastructure Courses PKI Courses

Course Description

Overview

Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.

Syllabus

Introduction
  • Why become an ethical hacker?
  • What you should know
1. Cryptography Basics
  • What does cryptography mean?
  • Different types of cryptography
2. Ciphers
  • Different types of ciphers
  • Symmetric encryption
  • Asymmetric encryption
  • Mixing asymmetric with symmetric
3. Hashing
  • Cryptographic hashing
4. Digital Certificates
  • How they are used
  • Trust models
5. Public Key Infrastructure (PKI)
  • Summary of exam expectations
  • Digital certificates and signing
  • Cryptographic key escrow
6. Applied Uses of Cryptography
  • Protocols that use cryptography
  • Why encrypt your filesystem?
7. Cryptographic Attacks
  • Types of attacks
  • Real-world exploits
  • Code-breaking methodologies
Conclusion
  • Summary of exam expectations

Taught by

Stephanie Domas

Related Courses

Information Security - Authentication and Access Control
New York University (NYU) via edX
Cryptography from Scratch| Master Cryptography in Java
Udemy
Securing Data with Asymmetric Cryptography
Pluralsight
Windows Server Network Infrastructure
Microsoft via Microsoft Learn
Windows 8: Networking and Security
LinkedIn Learning