Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Ethical Hacking: Cryptography

via LinkedIn Learning

Overview

Learn about the basic principles of cryptography and the most popular algorithms (and how they're used), as well as attack strategies and methodologies.

Syllabus

Introduction
  • Why become an ethical hacker?
  • What you should know
1. Cryptography Basics
  • What does cryptography mean?
  • Different types of cryptography
2. Ciphers
  • Different types of ciphers
  • Symmetric encryption
  • Asymmetric encryption
  • Mixing asymmetric with symmetric
3. Hashing
  • Cryptographic hashing
4. Digital Certificates
  • How they are used
  • Trust models
5. Public Key Infrastructure (PKI)
  • Summary of exam expectations
  • Digital certificates and signing
  • Cryptographic key escrow
6. Applied Uses of Cryptography
  • Protocols that use cryptography
  • Why encrypt your filesystem?
7. Cryptographic Attacks
  • Types of attacks
  • Real-world exploits
  • Code-breaking methodologies
Conclusion
  • Summary of exam expectations

Taught by

Stephanie Domas

Reviews

4.8 rating at LinkedIn Learning based on 106 ratings

Start your review of Ethical Hacking: Cryptography

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.