YoVDO

Ethical Hacking: Cryptography

Offered By: LinkedIn Learning

Tags

Cryptography Courses Ethical Hacking Courses Symmetric Encryption Courses Asymmetric Encryption Courses Digital Certificates Courses Hashing Courses Public Key Infrastructure Courses PKI Courses

Course Description

Overview

Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.

Syllabus

Introduction
  • Why become an ethical hacker?
  • What you should know
1. Cryptography Basics
  • What does cryptography mean?
  • Different types of cryptography
2. Ciphers
  • Different types of ciphers
  • Symmetric encryption
  • Asymmetric encryption
  • Mixing asymmetric with symmetric
3. Hashing
  • Cryptographic hashing
4. Digital Certificates
  • How they are used
  • Trust models
5. Public Key Infrastructure (PKI)
  • Summary of exam expectations
  • Digital certificates and signing
  • Cryptographic key escrow
6. Applied Uses of Cryptography
  • Protocols that use cryptography
  • Why encrypt your filesystem?
7. Cryptographic Attacks
  • Types of attacks
  • Real-world exploits
  • Code-breaking methodologies
Conclusion
  • Summary of exam expectations

Taught by

Stephanie Domas

Related Courses

Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX
Implement Secrets Management at Your Organization
Salesforce via Trailhead
CCSP Cert Prep: 2 Cloud Data Security Audio Review
LinkedIn Learning
CCSP Cert Prep: 2 Data Security
LinkedIn Learning
CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation
LinkedIn Learning