CEH v12: Cryptography, Algorithms, Implementations, and Tools
CEH v12
| Intermediate
- 3 videos | 1h 6m 44s
- Includes Assessment
- Earns a Badge
Encryption is one of the best security controls available for defending computer networks and data, and cryptography plays a vital role in this process. In this course, you'll explore cryptography, including its purpose, types, and common ciphers, to help you better understand the strengths and weaknesses of common crypto-systems. Next, you'll examine the common algorithms and implementations used by various crypto-systems, including symmetric and asymmetric algorithms, hashing functions, and digital signatures. Encryption is highly effective for protecting sensitive data, but how do you encrypt something? To complete this course, you'll learn about tools that can help you secure sensitive data on servers, desktops, e-mail, and mobile. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Describe the purpose of cryptographyidentify the common used types of cryptographydescribe the types of cryptographyRecognize common encryption and hashing functions and their usesdescribe common algorithms and implementations used by various crypto systems
-
recognize the common encryption algorithms and their typesidentify the strengths of commonly implemented hash functionsRecognize tools that will aid you in securing your sensitive data on serversrecognize tools that can aid in securing sensitive data on desktops
IN THIS COURSE
-
24m 22sUpon completion of this video, you will be able to provide an overview of cryptography, including its purpose, types, and common ciphers to help you better recognize the strengths and weaknesses of common crypto-systems. FREE ACCESS
-
19m 43sAfter completing this video, you will be able to recognize common algorithms and implementations used by crypto-systems, including symmetric and asymmetric algorithms, hashing functions, and digital signatures. FREE ACCESS
-
22m 41sUpon completion of this video, you will be able to identify tools that will aid you in securing your sensitive data on servers, desktops, e-mail, and mobile. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.