CEH v11: Cryptography Algorithms Implementations & Tools

placeholder

Encryption is one of the best security controls available for defending computer networks and data and cryptography plays a vital role in this process. In this course you;ll explore cryptography including its purpose types and common ciphers to help you better understand the strengths and weaknesses of common crypto-systems. Next you;ll examine the common algorithms and implementations used by various crypto-systems including symmetric and asymmetric algorithms hashing functions and digital signatures. Encryption is highly effective for protecting sensitive data but how do you encrypt something? To complete this course you;ll learn about tools that can help you to secure sensitive data on servers desktops e-mail and mobile. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.