Skip to Content
CEH Certified Ethical Hacker Cert Guide, 5th Edition
book

CEH Certified Ethical Hacker Cert Guide, 5th Edition

by Omar Santos, Michael Gregg
August 2025
Intermediate to advanced
917 pages
19h 41m
English
Pearson IT Certification
Content preview from CEH Certified Ethical Hacker Cert Guide, 5th Edition

Chapter 10

Cryptographic Attacks and Countermeasures

This chapter covers the following topics:

  • Cryptography History and Concepts: You should understand the history and basic concepts of cryptographic systems and how they function.

  • Encryption Algorithms: You should understand the difference between symmetric, asymmetric, and hashing algorithms. Each has a unique role in the world of cryptography and can be used to protect information in transit or at rest.

  • Public Key Infrastructure: You should understand the purpose of public key infrastructure (PKI) and its role in communication and e-commerce. It can provide third-party trust and make e-commerce possible.

  • Secure Protocols and Attack Countermeasures: You should understand secure protocols and ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

CEH Certified Ethical Hacker Cert Guide, 4th Edition

CEH Certified Ethical Hacker Cert Guide, 4th Edition

Michael Gregg, Omar Santos
CISSP Cert Guide, 5th Edition

CISSP Cert Guide, 5th Edition

Robin Abernathy, Darren R. Hayes

Publisher Resources

ISBN: 9780135485774