The Internet is an insecure medium, and attackers can see a lot of what you are sending. This is where cryptography comes in to play. Looking at cryptography from the attackers point a view is the best way to start protecting your resources.
Today the Internet is a part of our everyday life’s. From work to home, we are using the Internet for sending data back and forth across this public network. Some information is just a request for a webpage, while other requests are extremely confidential; like passwords, medical data, or financial data. Cryptography is the technology that we can use to changing the plain text to unreadable text. We use it during authentication, as well as to transfer data and to keep data confidential.
In this course, Ethical Hacking: Cryptography, you’ll learn the overall concepts of cryptography. First, you'll explore the different algorithms used along with those key concepts. Next, you’ll find out about the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll dive into what attacks might be thrown at you by attackers and how to protect yourself and your resources. By the end of this course, you'll gain greater knowledge of cryptography and how you can better implement it for your organization.
Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.
Course Overview Hi everyone. My name is Dale Meredith, and welcome to this course, Ethical Hacking Cryptography, which this course is actually a part of the Ethical Hacking series here at Pluralsight. Now I've personally been a Microsoft trainer since 1998, as well as a cybersecurity trainer and consultant. I've also worked with several, well hundreds, of Corporate 500 companies, as well as the Department of Homeland Security on several different projects. You know me, I like to say that I'd tell you about them, but I'd have to kill you. Now it kind of surprises me, the way that some folks and organizations treat the internet is really kind of crazy. Some treat it like it's their own personal network and that nobody can see what they're doing. Hey, newsflash everyone. The internet is a public network. Unless you use some sort of encryption, you're asking for problems. Listen, the tools of encryption and key management should and can be applied at different layers within your organization to protect, control, and isolate data. The technology is well known and standardized. And in no way should it be considered a scary technology that only the most sophisticated technical experts can understand and manage. Encryption is a system of mathematical algorithms that actually convert your data so that the intended recipient can read it. In this course, we're going to make sure that you have a great understanding of cryptography and why we use it. You'll also learn about the different types of ciphers and protocols used. Hey, have ever wondered about PKI? Well, I'm going to break it down for you so that you can understand it in simple terms. And you're also going to see some cool tools that you can use to not only encrypt but also check to make sure that encryption hasn't failed you. By the end of this course, you're going to have a great understanding of how cryptography works and how you can use it in emails, files, folders, even use it on full hard drives. Because this course is a part of the Ethical Hacking series here at Pluralsight, you should obviously have watched the previous courses within this series and be somewhat comfortable with networking technologies. After watching this course, you're going to have, again, a great foundation for your Ethical Hacking exam or if you want even moving deeper into the cryptography world.