Ethical Hacking: Cryptography
Offered By: Pluralsight
Course Description
Overview
Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.
Cryptography ("crypto") systems help in securing data against interception and compromise during online transmissions. In this course, Ethical Hacking: Cryptography, you’ll learn the skills required to make sure your cryptography infrastructure is as secure as possible. First, you’ll explore the overall concepts of crypto, as well as the different algorithms used. Next, you’ll discover the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll learn about the various attacks and countermeasures for cryptography. When you’re finished with this course, you’ll have the skills and knowledge of hacking cryptography needed for the CEH 312-50 exam.
Cryptography ("crypto") systems help in securing data against interception and compromise during online transmissions. In this course, Ethical Hacking: Cryptography, you’ll learn the skills required to make sure your cryptography infrastructure is as secure as possible. First, you’ll explore the overall concepts of crypto, as well as the different algorithms used. Next, you’ll discover the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll learn about the various attacks and countermeasures for cryptography. When you’re finished with this course, you’ll have the skills and knowledge of hacking cryptography needed for the CEH 312-50 exam.
Syllabus
- Course Overview 2mins
- Clarifying Cryptography Concepts 16mins
- Examining Encryption Algorithms 28mins
- Investigating Cryptography Tools 6mins
- Explaining Public Key Infrastructure (PKI) 10mins
- Outlining Email and Disk Encryption 20mins
- Investigating Cryptanalysis 23mins
- Reviewing Key Countermeasures 9mins
- Course Summary 1min
Taught by
Dale Meredith
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX