25.8.2
This website uses cookies to ensure you get the best experience on our website. Learn more

CEH v12: Cryptography, Algorithms, Implementations, and Tools

Ishit Choudhary

Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Encryption is one of the best security controls available for defending computer networks and data, and cryptography plays a vital role in this process. In this course, you'll explore cryptography, including its purpose, types, and common ciphers, to help you better understand the strengths and weaknesses of common crypto-systems. Next, you'll examine the common algorithms and implementations used by various crypto-systems, including symmetric and asymmetric algorithms, hashing functions, and digital signatures. Encryption is highly effective for protecting sensitive data, but how do you encrypt something? To complete this course, you'll learn about tools that can help you secure sensitive data on servers, desktops, e-mail, and mobile. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

Issued on

May 4, 2024

Expires on

Does not expire