English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 0h 59m | 103 MB
While the science of cryptography—in which data is mathematically scrambled—has roots in the protection of top-secret military communications, modern cryptography helps secure information for anyone with an email account. Cryptography techniques and practices are used for authentication, data integrity, confidentiality, and non-repudiation. In this course, Stephanie Domas takes this traditionally complex topic and breaks it down into understandable and approachable segments. Stephanie covers the basic principles of cryptography and the most popular algorithms (and how they’re used,) as well as attack strategies and methodologies. Learn about the different types of cyphers, hashing, digital certificates, public key infrastructure (PKI) components, and more.
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
Topics include:
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks
Table of Contents
Introduction
1 Why become an ethical hacker
2 What you should know
Cryptography Basics
3 What does cryptography mean
4 Different types of cryptography
Ciphers
5 Different types of ciphers
6 Symmetric encryption
7 Asymmetric encryption
8 Mixing asymmetric with symmetric
Hashing
9 Cryptographic hashing
Digital Certificates
10 How they are used
11 Trust models
Public Key Infrastructure (PKI)
12 Summary of exam expectations
13 Digital certificates and signing
14 Cryptographic key escrow
Applied Uses of Cryptography
15 Protocols that use cryptography
16 Why encrypt your filesystem
Cryptographic Attacks
17 Types of attacks
18 Real-world exploits
19 Code-breaking methodologies
Conclusion
20 Summary of exam expectations
Resolve the captcha to access the links!