Cryptography

MicroCourse
Time
1 hour 39 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Description

This final lesson in Section 2 of the Cryptography module focuses on public key cryptography. Every user on the network is given a public and private key for encryption. This lesson discusses how the public and private key exchange happens, how Asymmetric Cryptography works, what has to happen so that public and private key exchanges can authenticate, and what the advantage/disadvantages are to employing Asymmetric Cryptography. And finally, there is a contrast discussion on Symmetric vs. Asymmetric Cryptography discussion introducing how penetration testers can get the best out of both worlds.

Up Next

Cryptography

The art of writing or solving codes. Why do I need this certification? Our online lifestyle requires governments, the military, corporations, and consumers to properly protect their information from prying eyes

Instructed By

Instructor Profile Image
Leo Dregier
Instructor