- [Instructor] Now as far as the cryptography portion…of the Certified Ethical Hacker exam goes,…what types of questions can you actually expect?…What are the things you really do need…to make sure you know before attempting the exam?…As far as algorithms go, for every type of algorithm,…know whether or not it's symmetric or asymmetric.…Understand and know the key sizes that…that algorithm is able to leverage.…And know whether or not it's a block…or a stream cipher.…For all of the hashing algorithms,…make sure you understand the output size,…so for every single algorithm,…they have a fixed size output,…what is that size?…In PKI, or public key infrastructure,…understand the different roles…that are associated with PKI…and what each role is responsible for.…
In cryptographic attacks, you'll often see questions…phrased in such a way that given X type of information,…what type of an attack could an attacker conduct.…So given one particular piece of information,…what type of attacks open up to them,…and know the names of each of those attacks.…
Released
12/9/2019Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks
Share this video
Embed this video
Video: Summary of exam expectations