CEH v11: PKI, Cryptanalysis & Attack Countermeasures
Ethical Hacker v11
| Intermediate
- 3 Videos | 52m 59s
- Includes Assessment
- Earns a Badge
In today's day and age, we must be encrypting data for secure communication with third parties. But how is this accomplished? In this course, you'll examine Public Key Infrastructure as an encryption solution. You'll also explore PKI components, process, and how it compares with self-signed certificates. As long as there has been encrypted data, there have been attempts to break those encryptions. You'll next learn about cryptanalysis methods and attacks used to reveal hidden messages. Finally, you'll explore how to deploy the right encryption in the right way by learning about best practices and strategies for keeping your data safe. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
recognize the components of Public Key Infrastructure (PKI)compare the differences between PKI certificates issues by trusted authorities versus self-signed certificatesrecognize the components of a Certificate issued via PKIDescribe the Public Key Infrastructure processrecognize cryptanalysis methods used to reveal encrypted data
-
identify attacks used to reveal encrypted informationdescribe cryptanalysis methodsrecognize the different cryptanalysis attacksrecognize strategies for deploying encryptionrecognize best practices for protecting encryption systems
IN THIS COURSE
-
1.Public Key Infrastructure21m 8s
-
2.Cryptanalysis Methods and Attacks21m 52s
-
3.Crypto-Attack Countermeasures10m
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE

COURSE
CEH v11: Nmap IP Scans