YoVDO

Ethical Hacking: Cryptography

Offered By: LinkedIn Learning

Tags

Cryptography Courses Ethical Hacking Courses Symmetric Encryption Courses Asymmetric Encryption Courses Digital Certificates Courses Hashing Courses Public Key Infrastructure Courses PKI Courses

Course Description

Overview

Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.

Syllabus

Introduction
  • Why become an ethical hacker?
  • What you should know
1. Cryptography Basics
  • What does cryptography mean?
  • Different types of cryptography
2. Ciphers
  • Different types of ciphers
  • Symmetric encryption
  • Asymmetric encryption
  • Mixing asymmetric with symmetric
3. Hashing
  • Cryptographic hashing
4. Digital Certificates
  • How they are used
  • Trust models
5. Public Key Infrastructure (PKI)
  • Summary of exam expectations
  • Digital certificates and signing
  • Cryptographic key escrow
6. Applied Uses of Cryptography
  • Protocols that use cryptography
  • Why encrypt your filesystem?
7. Cryptographic Attacks
  • Types of attacks
  • Real-world exploits
  • Code-breaking methodologies
Conclusion
  • Summary of exam expectations

Taught by

Stephanie Domas

Related Courses

Introduction to Encryption and Cryptography
Raspberry Pi Foundation via edX
Cryptography: Learn Public Key Infrastructure from Scratch
Packt via Coursera
Cryptography and Digital Certificates
Coventry University via FutureLearn
Cryptography and Digital Certificates
Coventry University via FutureLearn
Cryptography
(ISC)² via Coursera