Ethical Hacking: Cryptography
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.
Syllabus
Introduction
- Why become an ethical hacker?
- What you should know
- What does cryptography mean?
- Different types of cryptography
- Different types of ciphers
- Symmetric encryption
- Asymmetric encryption
- Mixing asymmetric with symmetric
- Cryptographic hashing
- How they are used
- Trust models
- Summary of exam expectations
- Digital certificates and signing
- Cryptographic key escrow
- Protocols that use cryptography
- Why encrypt your filesystem?
- Types of attacks
- Real-world exploits
- Code-breaking methodologies
- Summary of exam expectations
Taught by
Stephanie Domas
Related Courses
Data Structures: An Active Learning ApproachUniversity of California, San Diego via edX Blockchain Basics
University at Buffalo via Coursera Intro to Data Structures and Algorithms
Google via Udacity Introduction to Blockchain Technologies
INSEAD via Coursera Data Structures
CEC via Swayam