Cryptography


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course analyzes the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. And the course examines electronic security measures and the hacking tools that can be used to break encryption. This course also assists students who are preparing for the EC Council's Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration (hours)
2.0

Lesson Objectives

Cryptography

  • define key cryptographic terms
  • distinguish between the most common types of symmetric key algorithms
  • select the appropriate message format for a scenario
  • distinguish between types of asymmetric algorithms
  • determine the appropriate cryptography implementation for a given scenario
  • distinguish between hash algorithms
  • recognize what's involved in different types of attack against hash algorithms
  • recognize the guidelines for key management and distribution
  • identify the characteristics of digital signatures
  • recognize how to implement best practices for e-mail encryption
  • distinguish between the security mechanisms for electronic transactions and e-mail
  • differentiate between various types of cipher
  • recognize the features of common hacking tools used in cryptanalysis
  • apply e-mail encryption guidelines and determine the appropriate hash algorithm for a given scenario
  • Course Number:
    sp_etih_a08_it_enus