Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Ethical Hacking: Cryptography

via Pluralsight

Overview

Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.

Cryptography ("crypto") systems help in securing data against interception and compromise during online transmissions. In this course, Ethical Hacking: Cryptography, you’ll learn the skills required to make sure your cryptography infrastructure is as secure as possible. First, you’ll explore the overall concepts of crypto, as well as the different algorithms used. Next, you’ll discover the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll learn about the various attacks and countermeasures for cryptography. When you’re finished with this course, you’ll have the skills and knowledge of hacking cryptography needed for the CEH 312-50 exam.

Syllabus

  • Course Overview 2mins
  • Clarifying Cryptography Concepts 16mins
  • Examining Encryption Algorithms 28mins
  • Investigating Cryptography Tools 6mins
  • Explaining Public Key Infrastructure (PKI) 10mins
  • Outlining Email and Disk Encryption 20mins
  • Investigating Cryptanalysis 23mins
  • Reviewing Key Countermeasures 9mins
  • Course Summary 1min

Taught by

Dale Meredith

Reviews

4.7 rating at Pluralsight based on 50 ratings

Start your review of Ethical Hacking: Cryptography

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.