CEH v12: PKI Cryptanalysis and Attack Countermeasures

placeholder

In today day and age data must be encrypted for secure communication with third parties. But how is this accomplished? In this course you;ll examine public key infrastructure (PKI) as an encryption solution. You;ll also explore PKI components processes and how it compares with self-signed certificates. As long as there has been encrypted data there have been attempts to break those encryptions. You;ll next learn about cryptanalysis methods and attacks used to reveal hidden messages. Finally you;ll explore how to deploy the right encryption in the right way by learning about best practices and strategies for keeping your data safe. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.