Module 18: Cryptography

Please purchase the course before starting the lesson.

Introduction: Confidentiality, integrity, authentication. Hash, security certificates, how the data is protected. Basic concepts and its importance. Learning Objectives: By the end of this lesson you should be able to: Know the concept of Cryptography. Analyze Cryptography types. See the use of Cryptography types. Cryptography Cryptography deals with encrypted or coded techniques; we can say [...]

Back to: Ultimate IT Security Certification Bundle > EC-Council Certified Ethical Hacker (CEHv10)