Ethical Hacking: Cryptography
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.
Syllabus
Introduction
- Why become an ethical hacker?
- What you should know
- What does cryptography mean?
- Different types of cryptography
- Different types of ciphers
- Symmetric encryption
- Asymmetric encryption
- Mixing asymmetric with symmetric
- Cryptographic hashing
- How they are used
- Trust models
- Summary of exam expectations
- Digital certificates and signing
- Cryptographic key escrow
- Protocols that use cryptography
- Why encrypt your filesystem?
- Types of attacks
- Real-world exploits
- Code-breaking methodologies
- Summary of exam expectations
Taught by
Stephanie Domas
Related Courses
Криптографические методы защиты информацииNational Research Nuclear University MEPhI via edX Implement Secrets Management at Your Organization
Salesforce via Trailhead CCSP Cert Prep: 2 Cloud Data Security Audio Review
LinkedIn Learning CCSP Cert Prep: 2 Data Security
LinkedIn Learning CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation
LinkedIn Learning