CEH v11: Cryptography Algorithms Implementations & Tools
Encryption is one of the best security controls available for defending computer networks and data and cryptography plays a vital role in this process. In this course youll explore cryptography including its purpose types and common ciphers to help you better understand the strengths and weaknesses of common crypto-systems. Next youll examine the common algorithms and implementations used by various crypto-systems including symmetric and asymmetric algorithms hashing functions and digital signatures. Encryption is highly effective for protecting sensitive data but how do you encrypt something? To complete this course youll learn about tools that can help you to secure sensitive data on servers desktops e-mail and mobile. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.