We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Ethical Hacking

Cryptography

Dale Meredith

Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.

Read more

Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.

Cryptography ("crypto") systems help in securing data against interception and compromise during online transmissions.

In this course, Ethical Hacking: Cryptography, you’ll learn the skills required to make sure your cryptography infrastructure is as secure as possible.

First, you’ll explore the overall concepts of crypto, as well as the different algorithms used. Next, you’ll discover the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll learn about the various attacks and countermeasures for cryptography. When you’re finished with this course, you’ll have the skills and knowledge of hacking cryptography needed for the CEH 312-50 exam.

Enroll now

What's inside

Syllabus

Course Overview
Clarifying Cryptography Concepts
Examining Encryption Algorithms
Investigating Cryptography Tools
Read more
Explaining Public Key Infrastructure (PKI)
Outlining Email and Disk Encryption
Investigating Cryptanalysis
Reviewing Key Countermeasures
Course Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops hacking skills in cryptography required for ethical hacking exams
Examines common encryption algorithms used in industry
Covers both PC and mobile-friendly tools used in cryptography
Explores attacks used against cryptography systems and countermeasures
Taught by Dale Meredith, an experienced instructor in ethical hacking
Requires CEH certification as prerequisite knowledge

Save this course

Save Ethical Hacking: Cryptography to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Ethical Hacking: Cryptography. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Ethical Hacking: Cryptography will develop knowledge and skills that may be useful to these careers:
Cryptography Engineer
The Cryptography Engineer designs, develops, and maintains systems and applications that use cryptography to protect data. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Cryptography Engineers who need to be able to design and implement secure systems and applications.
Cybersecurity Architect
Cybersecurity Architects design and implement security measures to protect computer networks and systems from unauthorized access, damage, or disruption. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Cybersecurity Architects who need to be able to design and implement secure networks and systems.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Security Consultants who need to be able to assess the security of systems and networks and recommend improvements.
Information Security Analyst
Information Security Analysts monitor and analyze security systems and data to identify and respond to threats. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Information Security Analysts who need to be able to identify and respond to security threats.
Ethical Hacker
Ethical Hackers use their knowledge of security vulnerabilities to test and evaluate the security of systems and networks. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Ethical Hackers who need to be able to identify and exploit security vulnerabilities.
Software Engineer
Software Engineers design, develop, and maintain software applications. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Software Engineers who need to be able to design and implement secure software applications.
Data Scientist
Data Scientists use data to solve business problems. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Data Scientists who need to be able to protect the data they are working with.
Network Administrator
Network Administrators manage and maintain computer networks. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Network Administrators who need to be able to secure their networks from unauthorized access.
Security Manager
Security Managers oversee the security of an organization's information and assets. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Security Managers who need to be able to develop and implement security policies and procedures.
IT Auditor
IT Auditors evaluate the security of an organization's information and technology systems. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for IT Auditors who need to be able to assess the security of an organization's systems and networks.
Information Security Officer
Information Security Officers are responsible for the security of an organization's information and assets. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Information Security Officers who need to be able to develop and implement security policies and procedures.
Compliance Officer
Compliance Officers ensure that an organization complies with all applicable laws and regulations. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Compliance Officers who need to be able to understand the security implications of an organization's policies and procedures.
Risk Manager
Risk Managers identify and assess the risks that an organization faces. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Risk Managers who need to be able to understand the security implications of an organization's risks.
Fraud Investigator
Fraud Investigators investigate cases of fraud and financial crime. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Fraud Investigators who need to be able to understand the security implications of fraud and financial crime.
Forensic Accountant
Forensic Accountants investigate financial crimes. This course provides a foundation in the concepts and algorithms used in cryptography, as well as the tools and techniques used to attack and defend against cryptographic systems. This knowledge is essential for Forensic Accountants who need to be able to understand the security implications of financial crime.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Ethical Hacking: Cryptography.
Widely-used textbook for cryptography and network security courses and should serve as an excellent reference book for this course.
Provides a good overview of network security, including cryptography. It useful reference tool for this course.
Provides a comprehensive overview of cryptography, including both theory and practice. It good reference book for this course.
Provides a fascinating and accessible overview of the history of cryptography. It good book to read for background knowledge on the subject.
Provides a good overview of social engineering, which common attack vector for cryptography. It good book to read for additional reading on the subject.
Provides a good overview of security engineering, including cryptography. It good book to read for additional reading on the subject.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Ethical Hacking: Cryptography.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser