CEH v11: PKI, Cryptanalysis & Attack Countermeasures

Ethical Hacker v11    |    Intermediate
  • 3 videos | 52m 59s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 18 users Rating 4.4 of 18 users (18)
In today's day and age, we must be encrypting data for secure communication with third parties. But how is this accomplished? In this course, you'll examine Public Key Infrastructure as an encryption solution. You'll also explore PKI components, process, and how it compares with self-signed certificates. As long as there has been encrypted data, there have been attempts to break those encryptions. You'll next learn about cryptanalysis methods and attacks used to reveal hidden messages. Finally, you'll explore how to deploy the right encryption in the right way by learning about best practices and strategies for keeping your data safe. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the components of public key infrastructure (pki)
    compare the differences between pki certificates issues by trusted authorities versus self-signed certificates
    recognize the components of a certificate issued via pki
    describe the public key infrastructure process
    Recognize cryptanalysis methods used to reveal encrypted data
  • identify attacks used to reveal encrypted information
    describe cryptanalysis methods
    recognize the different cryptanalysis attacks
    Recognize strategies for deploying encryption
    recognize best practices for protecting encryption systems

IN THIS COURSE

  • Locked
    1.  Public Key Infrastructure
    21m 8s
    Upon completion of this video, you will be able to recognize the components of a Certificate issued via Public Key Infrastructure. FREE ACCESS
  • Locked
    2.  Cryptanalysis Methods and Attacks
    21m 52s
    After watching this video, you will be able to describe cryptanalysis methods. FREE ACCESS
  • Locked
    3.  Crypto-Attack Countermeasures
    10m
    Upon completion of this video, you will be able to recognize strategies for deploying encryption. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 242 users Rating 4.6 of 242 users (242)
Rating 4.6 of 239 users Rating 4.6 of 239 users (239)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 41 users Rating 4.8 of 41 users (41)
Rating 4.6 of 18 users Rating 4.6 of 18 users (18)
Rating 4.6 of 87 users Rating 4.6 of 87 users (87)