Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Ethical Hacking: Cryptography

via Pluralsight

Overview

The Internet is an insecure medium, and attackers can see a lot of what you are sending. This is where cryptography comes in to play. Looking at cryptography from the attackers point a view is the best way to start protecting your resources.

Today the Internet is a part of our everyday life’s. From work to home, we are using the Internet for sending data back and forth across this public network. Some information is just a request for a webpage, while other requests are extremely confidential; like passwords, medical data, or financial data. Cryptography is the technology that we can use to changing the plain text to unreadable text. We use it during authentication, as well as to transfer data and to keep data confidential. In this course, Ethical Hacking: Cryptography, you’ll learn the overall concepts of cryptography. First, you'll explore the different algorithms used along with those key concepts. Next, you’ll find out about the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll dive into what attacks might be thrown at you by attackers and how to protect yourself and your resources. By the end of this course, you'll gain greater knowledge of cryptography and how you can better implement it for your organization.

Taught by

Dale Meredith

Reviews

4.4 rating at Pluralsight based on 48 ratings

Start your review of Ethical Hacking: Cryptography

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.