This course is included in our On-demand training solution.
Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course analyzes the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. And the course examines electronic security measures and the hacking tools that can be used to break encryption. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.
Existing or in-training IT security professionals seeking detailed security penetration testing skills
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems
Cryptographic Terminology and Symmetric Algorithms
Using Symmetric and Asymmetric Algorithms
Certificate Authority and Digital Signatures
Best Practices for E-mail Encryption
Cipher Types and Cryptanalytic Attacks
Security Algorithms and Implementations