Ethical Hacking: Cryptography

0
Join & Subscribe
LinkedIn Learning
Free Trial Available
English
Certificate Available
1-2 hours worth of material
selfpaced

Overview

Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.

While the science of cryptography—in which data is mathematically scrambled—has roots in the protection of top-secret military communications, modern cryptography helps secure information for anyone with an email account. Cryptography techniques and practices are used for authentication, data integrity, confidentiality, and non-repudiation. In this course, Stephanie Domas takes this traditionally complex topic and breaks it down into understandable and approachable segments. Stephanie covers the basic principles of cryptography and the most popular algorithms (and how they're used,) as well as attack strategies and methodologies. Learn about the different types of cyphers, hashing, digital certificates, public key infrastructure (PKI) components, and more.Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.

Syllabus

Introduction
  • Why become an ethical hacker?
  • What you should know
1. Cryptography Basics
  • What does cryptography mean?
  • Different types of cryptography
2. Ciphers
  • Different types of ciphers
  • Symmetric encryption
  • Asymmetric encryption
  • Mixing asymmetric with symmetric
3. Hashing
  • Cryptographic hashing
4. Digital Certificates
  • How they are used
  • Trust models
5. Public Key Infrastructure (PKI)
  • Summary of exam expectations
  • Digital certificates and signing
  • Cryptographic key escrow
6. Applied Uses of Cryptography
  • Protocols that use cryptography
  • Why encrypt your filesystem?
7. Cryptographic Attacks
  • Types of attacks
  • Real-world exploits
  • Code-breaking methodologies
Conclusion
  • Summary of exam expectations

Taught by

Stephanie Domas