CEH v11: PKI Cryptanalysis & Attack Countermeasures
In today day and age we must be encrypting data for secure communication with third parties. But how is this accomplished? In this course you;ll examine Public Key Infrastructure as an encryption solution. You;ll also explore PKI components process and how it compares with self-signed certificates. As long as there has been encrypted data there have been attempts to break those encryptions. You;ll next learn about cryptanalysis methods and attacks used to reveal hidden messages. Finally you;ll explore how to deploy the right encryption in the right way by learning about best practices and strategies for keeping your data safe. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.