Ethical Hacking: Cryptography
Offered By: Pluralsight
Course Description
Overview
The Internet is an insecure medium, and attackers can see a lot of what you are sending. This is where cryptography comes in to play. Looking at cryptography from the attackers point a view is the best way to start protecting your resources.
Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you will learn to understand and apply fundamental concepts of cryptography, the learner will understand requirements for cryptography, understand and support secure protocols, and will gain an understanding of how to operate and implement cryptographic systems. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking. Please make sure to watch SSCP®: Cryptography.
Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you will learn to understand and apply fundamental concepts of cryptography, the learner will understand requirements for cryptography, understand and support secure protocols, and will gain an understanding of how to operate and implement cryptographic systems. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking. Please make sure to watch SSCP®: Cryptography.
Syllabus
- Course Overview 3mins
- Understanding Cryptography 45mins
- Cryptography Tools 46mins
- PKI Made Simple 14mins
- Encrypting Emails, File, and Disk Drives 13mins
- The Attacks Against Cryptography 21mins
- Your Countermeasure 4mins
Taught by
Dale Meredith
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera