Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.
Cryptography ("crypto") systems help in securing data against interception and compromise during online transmissions.
In this course, Ethical Hacking: Cryptography, you’ll learn the skills required to make sure your cryptography infrastructure is as secure as possible.
Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.
Cryptography ("crypto") systems help in securing data against interception and compromise during online transmissions.
In this course, Ethical Hacking: Cryptography, you’ll learn the skills required to make sure your cryptography infrastructure is as secure as possible.
First, you’ll explore the overall concepts of crypto, as well as the different algorithms used. Next, you’ll discover the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll learn about the various attacks and countermeasures for cryptography. When you’re finished with this course, you’ll have the skills and knowledge of hacking cryptography needed for the CEH 312-50 exam.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.