Ethical Hacking: Cryptography
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.
Syllabus
Introduction
- Why become an ethical hacker?
- What you should know
- What does cryptography mean?
- Different types of cryptography
- Different types of ciphers
- Symmetric encryption
- Asymmetric encryption
- Mixing asymmetric with symmetric
- Cryptographic hashing
- How they are used
- Trust models
- Summary of exam expectations
- Digital certificates and signing
- Cryptographic key escrow
- Protocols that use cryptography
- Why encrypt your filesystem?
- Types of attacks
- Real-world exploits
- Code-breaking methodologies
- Summary of exam expectations
Taught by
Stephanie Domas
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX