- Регистрация
- 27 Авг 2018
- Сообщения
- 37,500
- Реакции
- 534,927
- Тема Автор Вы автор данного материала? |
- #1
Today the Internet is a part of our everyday life’s. From work to home, we are using the Internet for sending data back and forth across this public network. Some information is just a request for a webpage, while other requests are extremely confidential; like passwords, medical data, or financial data. Cryptography is the technology that we can use to changing the plain text to unreadable text. We use it during authentication, as well as to transfer data and to keep data confidential.
In this course, Ethical Hacking: Cryptography, you’ll learn the overall concepts of cryptography. First, you'll explore the different algorithms used along with those key concepts. Next, you’ll find out about the different tools and apps for both PC’s and mobile devices that you can use to deploy different types of cryptography. Finally, you’ll dive into what attacks might be thrown at you by attackers and how to protect yourself and your resources. By the end of this course, you'll gain greater knowledge of cryptography and how you can better implement it for your organization.
Hi everyone. My name is Dale Meredith, and welcome to this course, Ethical Hacking Cryptography, which this course is actually a part of the Ethical Hacking series here at Pluralsight. Now I've personally been a Microsoft trainer since 1998, as well as a cybersecurity trainer and consultant. I've also worked with several, well hundreds, of Corporate 500 companies, as well as the Department of Homeland Security on several different projects. You know me, I like to say that I'd tell you about them, but I'd have to kill you. Now it kind of surprises me, the way that some folks and organizations treat the internet is really kind of crazy. Some treat it like it's their own personal network and that nobody can see what they're doing. Hey, newsflash everyone. The internet is a public network. Unless you use some sort of encryption, you're asking for problems. Listen, the tools of encryption and key management should and can be applied at different layers within your organization to protect, control, and isolate data. The technology is well known and standardized. And in no way should it be considered a scary technology that only the most sophisticated technical experts can understand and manage. Encryption is a system of mathematical algorithms that actually convert your data so that the intended recipient can read it. In this course, we're going to make sure that you have a great understanding of cryptography and why we use it. You'll also learn about the different types of ciphers and protocols used. Hey, have ever wondered about PKI? Well, I'm going to break it down for you so that you can understand it in simple terms. And you're also going to see some cool tools that you can use to not only encrypt but also check to make sure that encryption hasn't failed you. By the end of this course, you're going to have a great understanding of how cryptography works and how you can use it in emails, files, folders, even use it on full hard drives. Because this course is a part of the Ethical Hacking series here at Pluralsight, you should obviously have watched the previous courses within this series and be somewhat comfortable with networking technologies. After watching this course, you're going to have, again, a great foundation for your Ethical Hacking exam or if you want even moving deeper into the cryptography world.
About the author
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material.
SALES PAGE:
DOWNLOAD:
Последнее редактирование: