Certified Ethical Hacker (CEH) v8: Enumeration and Cryptography
This course is included in the Everything IT Self-Paced training package.
During the enumeration phase of an attack, the attacker creates active connections to an organization’s network environment and performs directed queries to gain additional information. In this course, we look at enumeration and the types of enumeration an attacker can perform. We also look at encryption and the technologies and protocols used. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fourth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Network and information security professionals
Network Protocol-Based Enumeration
Enumeration Countermeasures and Penetration Testing
Cryptographic Algorithms and Tools
PKI and E-mail and Disk Encryption
Cryptographic Attacks and Cryptanalysis Tools
Enumeration Tools and Techniques
This Course is included in our Everything IT Self-Paced Training Package.Learn More