5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     EC Council     Certified Ethical hacker     Certified Ethical Hacker (CEH) v11

Encryption is one of the best security controls available for defending computer networks and data, and cryptography plays a vital role in this process. In this course, you'll explore cryptography, including its purpose, types, and common ciphers, to help you better understand the strengths and weaknesses of common crypto-systems. Next, you'll examine the common algorithms and implementations used by various crypto-systems, including symmetric and asymmetric algorithms, hashing functions, and digital signatures. Encryption is highly effective for protecting sensitive data, but how do you encrypt something? To complete this course, you'll learn about tools that can help you to secure sensitive data on servers, desktops, e-mail, and mobile. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEHv11: Cryptography, Algorithms, Implementations & Tools

  • describe the purpose of cryptography
  • describe the types of cryptography
  • identify the common used types of cryptography
  • describe common algorithms and implementations used by various crypto systems
  • identify the strengths of commonly implemented hash functions
  • recognize common encryption and hashing functions and their uses
  • recognize the common encryption algorithms and their types
  • recognize tools that can aid in securing sensitive data on desktops
  • recognize tools that will aid you in securing your sensitive data on servers