CEH v11: Cryptography, Algorithms, Implementations & Tools

Ethical Hacker v11    |    Intermediate
  • 3 videos | 49m 10s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 17 users Rating 4.8 of 17 users (17)
Encryption is one of the best security controls available for defending computer networks and data, and cryptography plays a vital role in this process. In this course, you'll explore cryptography, including its purpose, types, and common ciphers, to help you better understand the strengths and weaknesses of common crypto-systems. Next, you'll examine the common algorithms and implementations used by various crypto-systems, including symmetric and asymmetric algorithms, hashing functions, and digital signatures. Encryption is highly effective for protecting sensitive data, but how do you encrypt something? To complete this course, you'll learn about tools that can help you to secure sensitive data on servers, desktops, e-mail, and mobile. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Identify the common used types of cryptography
    describe the purpose of cryptography
    describe the types of cryptography
    Recognize common encryption and hashing functions and their uses
    recognize the common encryption algorithms and their types
  • identify the strengths of commonly implemented hash functions
    describe common algorithms and implementations used by various crypto systems
    Recognize tools that will aid you in securing your sensitive data on servers
    recognize tools that can aid in securing sensitive data on desktops

IN THIS COURSE

  • Locked
    1.  Cryptography Concepts
    15m 31s
    Upon completion of this video, you will be able to describe the types of cryptography. FREE ACCESS
  • Locked
    2.  Crypto Algorithms and Implementations
    23m 55s
    After completing this video, you will be able to describe common algorithms and implementations used by various crypto systems. FREE ACCESS
  • Locked
    3.  Cryptography Tools
    9m 44s
    Upon completion of this video, you will be able to recognize tools that can aid in securing sensitive data on desktops. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Rating 4.7 of 24 users Rating 4.7 of 24 users (24)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 179 users Rating 4.5 of 179 users (179)
Rating 4.6 of 19 users Rating 4.6 of 19 users (19)
Rating 4.5 of 86 users Rating 4.5 of 86 users (86)