5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker (CEH) v11

In today's day and age, we must be encrypting data for secure communication with third parties. But how is this accomplished? In this course, you'll examine Public Key Infrastructure as an encryption solution. You'll also explore PKI components, process, and how it compares with self-signed certificates. As long as there has been encrypted data, there have been attempts to break those encryptions. You'll next learn about cryptanalysis methods and attacks used to reveal hidden messages. Finally, you'll explore how to deploy the right encryption in the right way by learning about best practices and strategies for keeping your data safe. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEHv11: PKI, Cryptanalysis & Attack Countermeasures

  • compare the differences between PKI certificates issues by trusted authorities versus self-signed certificates
  • Describe the Public Key Infrastructure process
  • recognize the components of a Certificate issued via PKI
  • recognize the components of Public Key Infrastructure (PKI)
  • describe cryptanalysis methods
  • identify attacks used to reveal encrypted information
  • recognize cryptanalysis methods used to reveal encrypted data
  • recognize the different cryptanalysis attacks
  • recognize best practices for protecting encryption systems
  • recognize strategies for deploying encryption