Ethical Hacking: Cryptography for Hackers

$49.99

Dive into the field of Cyber Security with this Ethical Hacking: Cryptography for Hackers training course. You will learn about message authentication, virtual private networking, Windows encryption, advanced cryptology, and so much more!

Length: 1.5 hrs

This title is available in the
Total Training All-Access library.

Subscribe Now

Description

With this Ethical Hacking: Cryptography for Hackers training course, you will learn how cryptography can be used for user authentication, plus how you can protect data from theft or alteration.

Each chapter closes with exercises, putting your newly learned skills into practical use immediately.

This course is for both beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings globally, and demand is greatly outpacing supply – which means more opportunity, job security, and higher pay for you!

What is Cryptography?

Cryptography is a practice of computer science that involves storing and transmitting data in a way that only those for whom it is intended can read and process it. Cryptography protects data from theft or alteration, and it can also be used for user authentication.

Cryptography is a crucial aspect of cyber security, being used in many applications such as banking transactions cards, computer passwords, and e-commerce transactions.

 

Sample clip

 

Ethical Hacking: Cryptography for Hackers
 Introduction (7:14)
 Advanced Crypto (13:40)
 Message Authentication Codes and Hashes (5:40)
 Transport Layer Security (3:38)
 Virtual Private Networking (45:00)
 Windows Encryption (7:36)
 Apache SSL (5:00)
 Web Encoding (2:55)
 Key Management (16:55)
 Storage Encryption (18:41)

Chad Russell has been in the CyberSecurity industry for over 15 years. He has taught Microsoft Engineering courses as a Certified trainer, managed teams of security engineers and analysts for an internet banking provider, and has been an information security consultant working for companies including SAP, Microsoft and Oracle.

He leads and conducts ‘Security Risk Assessments’ for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security, and access management.

Over the past 15 years he has held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications, and has a B.S. in Computer Science from Excelsior College.

You may also like…