CEH v12: PKI, Cryptanalysis, and Attack Countermeasures
CEH v12
| Intermediate
- 3 videos | 51m 30s
- Includes Assessment
- Earns a Badge
In today's day and age, data must be encrypted for secure communication with third parties. But how is this accomplished? In this course, you'll examine public key infrastructure (PKI) as an encryption solution. You'll also explore PKI components, processes, and how it compares with self-signed certificates. As long as there has been encrypted data, there have been attempts to break those encryptions. You'll next learn about cryptanalysis methods and attacks used to reveal hidden messages. Finally, you'll explore how to deploy the right encryption in the right way by learning about best practices and strategies for keeping your data safe. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Recognize the components of public key infrastructure (pki)recognize the components of a certificate issued via pkidescribe the public key infrastructure processcompare the differences between pki certificates issues by trusted authorities versus self-signed certificatesDescribe cryptanalysis methods
-
recognize the different cryptanalysis attacksrecognize cryptanalysis methods used to reveal encrypted dataidentify attacks used to reveal encrypted informationRecognize best practices for protecting encryption systemsrecognize strategies for deploying encryption
IN THIS COURSE
-
20m 28sAfter completing this video, you will be able to outline the use of public key infrastructure (PKI) as a solution for encrypting data for secure communication with third parties, as well as its components, its process, and how it compares with self-signed certificates. FREE ACCESS
-
19m 34sUpon completion of this video, you will be able to describe cryptanalysis methods and attacks used to reveal encrypted information. FREE ACCESS
-
11m 28sAfter completing this video, you will be able to recognize best practices and strategies for correctly deploying encryption. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.