Ethical Hacking: Cryptography
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.
Syllabus
Introduction
- Why become an ethical hacker?
- What you should know
- What does cryptography mean?
- Different types of cryptography
- Different types of ciphers
- Symmetric encryption
- Asymmetric encryption
- Mixing asymmetric with symmetric
- Cryptographic hashing
- How they are used
- Trust models
- Summary of exam expectations
- Digital certificates and signing
- Cryptographic key escrow
- Protocols that use cryptography
- Why encrypt your filesystem?
- Types of attacks
- Real-world exploits
- Code-breaking methodologies
- Summary of exam expectations
Taught by
Stephanie Domas
Related Courses
Introduction to Encryption and CryptographyRaspberry Pi Foundation via edX Cryptography: Learn Public Key Infrastructure from Scratch
Packt via Coursera Cryptography and Digital Certificates
Coventry University via FutureLearn Cryptography and Digital Certificates
Coventry University via FutureLearn Cryptography
(ISC)² via Coursera