Join Stephanie Domas for an in-depth discussion in this video What you should know, part of Ethical Hacking: Cryptography.
- [Instructor] Here's what you need to know for this course. We're going to cover the information needed for the Cryptography module of the Certified Ethical Hacker Exam. No prior experience in cryptography is necessary for you to understand the material in this course. So as I mentioned, this is the Cryptography section of the Certified Ethical Hacker Exam, often referred to as the CEH Exam. The exam itself, in its entirety, consists of 125 questions. It takes four hours to complete, and it's in multiple choice format. Every few years, they rev the version of the exam, and they're currently on version number 10.
Now, of those 125 questions, there's no guarantee to how many of them will be about Cryptography, but I can guarantee that the content in this course will prepare you for all the Cryptography questions that you'll face.
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks