Skip to Content
CEH Certified Ethical Hacker Cert Guide, 4th Edition
book

CEH Certified Ethical Hacker Cert Guide, 4th Edition

by Michael Gregg, Omar Santos
February 2022
Intermediate to advanced
752 pages
19h 37m
English
Pearson IT Certification
Content preview from CEH Certified Ethical Hacker Cert Guide, 4th Edition

Chapter 10

Cryptographic Attacks and Defenses

This chapter covers the following topics:

  • Cryptography History and Concepts: You should understand the history and basic concepts of cryptographic systems and how they function.

  • Encryption Algorithms: You should understand the difference between symmetric, asymmetric, and hashing algorithms. Each has a unique role in the world of cryptography and can be used to protect information in transit or at rest.

  • Public Key Infrastructure: You should understand the purpose of public key infrastructure (PKI) and its role in communication and e-commerce. It can provide third-party trust and make e-commerce possible.

  • Secure Protocols and Countermeasures: You should understand secure protocols and how they ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Certified Ethical Hacker (CEH) Study Guide

Certified Ethical Hacker (CEH) Study Guide

Matt Walker

Publisher Resources

ISBN: 9780137489930