Cryptography

This course is included in our On-demand training solution.

Overview

Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course analyzes the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. And the course examines electronic security measures and the hacking tools that can be used to break encryption. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience

Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites

A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration

120 min.

Course Objectives

Cryptographic Terminology and Symmetric Algorithms

  • define key cryptographic terms
  • distinguish between the most common types of symmetric key algorithms
  • Asymmetric Algorithms

  • select the appropriate message format for a scenario
  • distinguish between types of asymmetric algorithms
  • Using Symmetric and Asymmetric Algorithms

    Message Authentication

  • distinguish between hash algorithms
  • recognize what’s involved in different types of attack against hash algorithms
  • Certificate Authority and Digital Signatures

  • recognize the guidelines for key management and distribution
  • identify the characteristics of digital signatures
  • Best Practices for E-mail Encryption

  • recognize how to implement best practices for e-mail encryption
  • distinguish between the security mechanisms for electronic transactions and e-mail
  • Cipher Types and Cryptanalytic Attacks

  • differentiate between various types of cipher
  • recognize the features of common hacking tools used in cryptanalysis
  • Security Algorithms and Implementations

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?