Ethical Hacking: Cryptography
Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.
Cryptography (“crypto”) systems help in securing data against interception and compromise during online transmissions. In this course, Ethical Hacking: Cryptography, you’ll learn the skills required to make sure your cryptography infrastructure is as secure as possible. First, you’ll explore the overall concepts of crypto, as well as the different algorithms used. Next, you’ll discover the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll learn about the various attacks and countermeasures for cryptography. When you’re finished with this course, you’ll have the skills and knowledge of hacking cryptography needed for the CEH 312-50 exam.
Author Name: Dale Meredith
Author Description:
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale’s expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale’s instruction is memorable and entertaining. Dale’s knowl… more
Table of Contents
- Course Overview
2mins - Clarifying Cryptography Concepts
16mins - Examining Encryption Algorithms
28mins - Investigating Cryptography Tools
6mins - Explaining Public Key Infrastructure (PKI)
10mins - Outlining Email and Disk Encryption
20mins - Investigating Cryptanalysis
23mins - Reviewing Key Countermeasures
9mins - Course Summary
1min
There are no reviews yet.