Ethical Hacking: Cryptography
The Internet is an insecure medium, and attackers can see a lot of what you are sending. This is where cryptography comes in to play. Looking at cryptography from the attackers point a view is the best way to start protecting your resources.
Today the Internet is a part of our everyday life’s. From work to home, we are using the Internet for sending data back and forth across this public network. Some information is just a request for a webpage, while other requests are extremely confidential; like passwords, medical data, or financial data. Cryptography is the technology that we can use to changing the plain text to unreadable text. We use it during authentication, as well as to transfer data and to keep data confidential. In this course, Ethical Hacking: Cryptography, you’ll learn the overall concepts of cryptography. First, you’ll explore the different algorithms used along with those key concepts. Next, you’ll find out about the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll dive into what attacks might be thrown at you by attackers and how to protect yourself and your resources. By the end of this course, you’ll gain greater knowledge of cryptography and how you can better implement it for your organization.
Author Name: Dale Meredith
Author Description:
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale’s expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale’s instruction is memorable and entertaining. Dale’s knowl… more
There are no reviews yet.