The Internet is an insecure medium, and attackers can see a lot of what you are sending. This is where cryptography comes in to play. Looking at cryptography from the attackers point a view is the best way to start protecting your resources.
Today the Internet is a part of our everyday life’s. From work to home, we are using the Internet for sending data back and forth across this public network. Some information is just a request for a webpage, while other requests are extremely confidential; like passwords, medical data, or financial data. Cryptography is the technology that we can use to changing the plain text to unreadable text. We use it during authentication, as well as to transfer data and to keep data confidential.
In this course, Ethical Hacking: Cryptography, you’ll learn the overall concepts of cryptography. First, you'll explore the different algorithms used along with those key concepts. Next, you’ll find out about the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll dive into what attacks might be thrown at you by attackers and how to protect yourself and your resources. By the end of this course, you'll gain greater knowledge of cryptography and how you can better implement it for your organization.
Dale Meredith received his Certified Ethical Hacker and Certified EC-Counsel Instructor certifications back in 2006, as well as being a Microsoft Certified Trainer since 1998 (yes we had computers back then). Dale takes great pride in helping students comprehend and simplify complex IT concepts.
Course Overview Hi everyone. My name is Dale Meredith, and welcome to this course, Ethical Hacking Cryptography, which this course is actually a part of the Ethical Hacking series here at Pluralsight. Now I've personally been a Microsoft trainer since 1998, as well as a cybersecurity trainer and consultant. I've also worked with several, well hundreds, of Corporate 500 companies, as well as the Department of Homeland Security on several different projects. You know me, I like to say that I'd tell you about them, but I'd have to kill you. Now it kind of surprises me, the way that some folks and organizations treat the internet is really kind of crazy. Some treat it like it's their own personal network and that nobody can see what they're doing. Hey, newsflash everyone. The internet is a public network. Unless you use some sort of encryption, you're asking for problems. Listen, the tools of encryption and key management should and can be applied at different layers within your organization to protect, control, and isolate data. The technology is well known and standardized. And in no way should it be considered a scary technology that only the most sophisticated technical experts can understand and manage. Encryption is a system of mathematical algorithms that actually convert your data so that the intended recipient can read it. In this course, we're going to make sure that you have a great understanding of cryptography and why we use it. You'll also learn about the different types of ciphers and protocols used. Hey, have ever wondered about PKI? Well, I'm going to break it down for you so that you can understand it in simple terms. And you're also going to see some cool tools that you can use to not only encrypt but also check to make sure that encryption hasn't failed you. By the end of this course, you're going to have a great understanding of how cryptography works and how you can use it in emails, files, folders, even use it on full hard drives. Because this course is a part of the Ethical Hacking series here at Pluralsight, you should obviously have watched the previous courses within this series and be somewhat comfortable with networking technologies. After watching this course, you're going to have, again, a great foundation for your Ethical Hacking exam or if you want even moving deeper into the cryptography world.
Cryptography Tools Look, I've got some cool tools, bro. Actually, these are just tools, they are kind of cool, for cryptography, and one I've already shown you, but we'll go through and take a look at some additional ones. In this particular module, we're going to take a look at, first of all, MD5 hash calculators. That's kind of the one I gave away in the previous module, but that's okay. I've got a couple other tools that we can show you here. We'll then go through and take a look at how we use some of these tools for encrypting folders and files. And because it's not just folders and files, we'll also take a look at how we use different utilities for encrypting drives. And then, of course, we'll go through and take a look at some of the tools that are out there for mobile devices. So when you're ready to get going, just go ahead and hit Next, and let's continue.
PKI Made Simple Okay, PKI Made Simple. I know you're thinking, "Right, Dale. " Trust me. I'm going to make this easy for us. In this module, we're going to go through and talk about what actually is PKI. We'll then go through and take a look at how does it work? It's actually very simple at a higher level. The configuration of it, the detailed configuration is going to depend on your own infrastructure, and so we won't cover that here, but we will talk about, hey, who do we trust? Because we have to trust somebody in order for PKI to operate correctly. And then, of course, we're going to take a look at what's entailed or what is a part of your certificate that you are issued? So when you think you're ready, go ahead and hit Next, and we'll get going.
Encrypting Emails, File, and Disk Drives Let's talk about probably one of the most important communication mechanisms that we use as of the recording of this particular course, who knows what's going to happen in the future, but emails. So what we're going to talk about in this particular module is we're going to go through and take a look at digital signatures a little bit more in depth, the technology that's being utilized. We'll then go through and take a look at SSL, which is Secure Socket Layer, and TLS, which is Transport Layer Security. I know, some of you guys are probably saying, "Dale, that's kind of the same thing nowadays, " and I get that. We'll talk about that if that's new to you. Then we'll go through and take a look at PGP, which is short for Pretty Good Privacy. Actually it's very good privacy kind of, but we'll talk about that one too. So let's get going.
The Attacks Against Cryptography Let's talk about some of the attacks that hackers throw against cryptography. In this module, we're going to go through and take a look at a couple of things. We'll first look at cryptanalysis methods that are used. Then we'll go through and take a look at breaking or code-breaking methods that could be used against you as well, and, of course, we'll look at some actual attacks, the names of them, and how they're used, well, not in detail. Again, my goal here is to make sure that you have enough info for your "immediate future. " So when you're ready get going, go ahead and hit Next.
Your Countermeasure This module's going to be relatively short because, hey, guess what?, there're only a couple of things we can learn here. In this module, we're going to talk about the 12 things that you can do as far as countermeasures. They're really high level because the fact that it really does depend on your infrastructure, what you're using for cryptography, just everything that's going to be customized towards you. So we're going to give you some 12 general things that you should keep in mind. So once you're ready to go, hit Next and we'll take a look at all 12.