We may earn an affiliate commission when you visit our partners.
Dale Meredith

Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.

Cryptography ("crypto") systems help in securing data against interception and compromise during online transmissions.

In this course, Ethical Hacking: Cryptography, you’ll learn the skills required to make sure your cryptography infrastructure is as secure as possible.

Read more

Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.

Cryptography ("crypto") systems help in securing data against interception and compromise during online transmissions.

In this course, Ethical Hacking: Cryptography, you’ll learn the skills required to make sure your cryptography infrastructure is as secure as possible.

First, you’ll explore the overall concepts of crypto, as well as the different algorithms used. Next, you’ll discover the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll learn about the various attacks and countermeasures for cryptography. When you’re finished with this course, you’ll have the skills and knowledge of hacking cryptography needed for the CEH 312-50 exam.

Enroll now

What's inside

Syllabus

Course Overview
Clarifying Cryptography Concepts
Examining Encryption Algorithms
Investigating Cryptography Tools
Read more
Explaining Public Key Infrastructure (PKI)
Outlining Email and Disk Encryption
Investigating Cryptanalysis
Reviewing Key Countermeasures
Course Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops hacking skills in cryptography required for ethical hacking exams
Examines common encryption algorithms used in industry
Covers both PC and mobile-friendly tools used in cryptography
Explores attacks used against cryptography systems and countermeasures
Taught by Dale Meredith, an experienced instructor in ethical hacking
Requires CEH certification as prerequisite knowledge

Save this course

Save Ethical Hacking: Cryptography to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Ethical Hacking: Cryptography with these activities:
Read a book about cryptography
Reading a book about cryptography can help you gain a deeper understanding of the subject and learn about the latest trends in cryptography.
Show steps
  • Find a book that is appropriate for your level of knowledge.
  • Read the book carefully and take notes.
  • Discuss the book with other students or a mentor.
Follow a cryptography tutorial
Following a cryptography tutorial can help you reinforce your understanding of the concepts covered in the course.
Browse courses on Cryptography
Show steps
  • Find a tutorial that covers the topics you want to learn more about.
  • Follow the tutorial step-by-step.
  • Take notes on the key concepts.
Participate in a cryptography study group
Participating in a cryptography study group can help you learn from others and share your own knowledge.
Browse courses on Cryptography
Show steps
  • Find a study group that meets your needs.
  • Attend the study group meetings regularly.
  • Participate in the discussions and activities.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Solve cryptography puzzles
Solving cryptography puzzles can help you develop your problem-solving skills and improve your understanding of cryptography.
Browse courses on Cryptography
Show steps
  • Find a website or book that offers cryptography puzzles.
  • Start solving the puzzles.
  • Don't be afraid to ask for help if you get stuck.
Attend a cryptography workshop
Attending a cryptography workshop can help you learn about the latest trends in cryptography and meet other people in the field.
Browse courses on Cryptography
Show steps
  • Find a cryptography workshop that you want to attend.
  • Register for the workshop.
  • Attend the workshop and participate in the activities.
Develop a cryptography tool
Developing a cryptography tool can help you apply your knowledge of cryptography and learn about the practical aspects of cryptography.
Browse courses on Cryptography
Show steps
  • Identify a problem that you want to solve with a cryptography tool.
  • Design and implement the tool.
  • Test the tool and make sure it works correctly.
  • Share the tool with others.
Participate in a cryptography competition
Participating in a cryptography competition can help you test your skills and learn from others.
Browse courses on Cryptography
Show steps
  • Find a cryptography competition that you want to participate in.
  • Prepare for the competition by studying cryptography and practicing your skills.
  • Compete in the competition and do your best.
Contribute to an open-source cryptography project
Contributing to an open-source cryptography project can help you learn about cryptography and contribute to the community.
Browse courses on Cryptography
Show steps
  • Find an open-source cryptography project that you want to contribute to.
  • Learn about the project and its goals.
  • Make a contribution to the project.

Career center

Learners who complete Ethical Hacking: Cryptography will develop knowledge and skills that may be useful to these careers:
Cryptography Engineer
The Cryptography Engineer designs, develops, and maintains systems and applications that use cryptography to protect data. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Cryptography Engineers who need to be able to design and implement secure systems and applications.
Cybersecurity Architect
Cybersecurity Architects design and implement security measures to protect computer networks and systems from unauthorized access, damage, or disruption. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Cybersecurity Architects who need to be able to design and implement secure networks and systems.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Security Consultants who need to be able to assess the security of systems and networks and recommend improvements.
Information Security Analyst
Information Security Analysts monitor and analyze security systems and data to identify and respond to threats. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Information Security Analysts who need to be able to identify and respond to security threats.
Ethical Hacker
Ethical Hackers use their knowledge of security vulnerabilities to test and evaluate the security of systems and networks. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Ethical Hackers who need to be able to identify and exploit security vulnerabilities.
Software Engineer
Software Engineers design, develop, and maintain software applications. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Software Engineers who need to be able to design and implement secure software applications.
Data Scientist
Data Scientists use data to solve business problems. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Data Scientists who need to be able to protect the data they are working with.
Network Administrator
Network Administrators manage and maintain computer networks. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Network Administrators who need to be able to secure their networks from unauthorized access.
Security Manager
Security Managers oversee the security of an organization's information and assets. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Security Managers who need to be able to develop and implement security policies and procedures.
IT Auditor
IT Auditors evaluate the security of an organization's information and technology systems. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for IT Auditors who need to be able to assess the security of an organization's systems and networks.
Information Security Officer
Information Security Officers are responsible for the security of an organization's information and assets. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Information Security Officers who need to be able to develop and implement security policies and procedures.
Compliance Officer
Compliance Officers ensure that an organization complies with all applicable laws and regulations. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Compliance Officers who need to be able to understand the security implications of an organization's policies and procedures.
Risk Manager
Risk Managers identify and assess the risks that an organization faces. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Risk Managers who need to be able to understand the security implications of an organization's risks.
Fraud Investigator
Fraud Investigators investigate cases of fraud and financial crime. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Fraud Investigators who need to be able to understand the security implications of fraud and financial crime.
Forensic Accountant
Forensic Accountants investigate financial crimes. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Forensic Accountants who need to be able to understand the security implications of financial crime.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ethical Hacking: Cryptography.
Widely-used textbook for cryptography and network security courses and should serve as an excellent reference book for this course.
Provides a good overview of network security, including cryptography. It useful reference tool for this course.
Provides a comprehensive overview of cryptography, including both theory and practice. It good reference book for this course.
Provides a fascinating and accessible overview of the history of cryptography. It good book to read for background knowledge on the subject.
Provides a good overview of social engineering, which common attack vector for cryptography. It good book to read for additional reading on the subject.
Provides a good overview of security engineering, including cryptography. It good book to read for additional reading on the subject.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Ethical Hacking: Cryptography.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser