YoVDO

Ethical Hacking: Cryptography

Offered By: Pluralsight

Tags

Cryptography Courses Ethical Hacking Courses Data Security Courses Cryptanalysis Courses

Course Description

Overview

Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.

Cryptography ("crypto") systems help in securing data against interception and compromise during online transmissions. In this course, Ethical Hacking: Cryptography, you’ll learn the skills required to make sure your cryptography infrastructure is as secure as possible. First, you’ll explore the overall concepts of crypto, as well as the different algorithms used. Next, you’ll discover the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll learn about the various attacks and countermeasures for cryptography. When you’re finished with this course, you’ll have the skills and knowledge of hacking cryptography needed for the CEH 312-50 exam.

Syllabus

  • Course Overview 2mins
  • Clarifying Cryptography Concepts 16mins
  • Examining Encryption Algorithms 28mins
  • Investigating Cryptography Tools 6mins
  • Explaining Public Key Infrastructure (PKI) 10mins
  • Outlining Email and Disk Encryption 20mins
  • Investigating Cryptanalysis 23mins
  • Reviewing Key Countermeasures 9mins
  • Course Summary 1min

Taught by

Dale Meredith

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX