• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

119 Cryptography courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Conversation on Cryptography

By Course Cloud

COURSE OVERVIEW Learn how to use the most critical part of IT security and the critical role it plays in protecting our digital data with this comprehensive Conversation on Cryptography.  The use of practical cryptography is essential for the installation and maintenance of IT security protection. This course provides extensive and expert tuition for the most valuable cyphers and methods for safeguarding an IT environment.   This Cryptography course provides an excellent overview of the cryptographic principles that need to be understood and mastered in an IT security role. You will be shown the most appropriate cyphers to use for different settings, types of asymmetric methods, usage of Public Key Infrastructure (PKI), and much more. If you want to gain the highest level of cybersecurity expertise, this will be the ideal choice for your learning needs. Enrol now and keep the cybercriminals in their place.  This best selling Conversation on Cryptography has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Conversation on Cryptography is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Conversation on Cryptography is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Conversation on Cryptography is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Conversation on Cryptography, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Conversation on Cryptography will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Conversation on Cryptography to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Conversation on Cryptography
Delivered Online On Demand
£319

Cryptography: Learn Public Key Infrastructure from Scratch

By Packt

This interactive course will help you to gain a solid understanding of cryptography. With the help of engaging activities and examples, you'll be familiarized with different security certificates and become confident in deploying PKI on Windows Servers.

Cryptography: Learn Public Key Infrastructure from Scratch
Delivered Online On Demand
£44.99

Java Certification Cryptography Architecture - CPD Certified

5.0(2)

By Studyhub UK

24 Hour Flash Deal **25-in-1 Java Certification Cryptography Architecture Mega Bundle** Java Certification Cryptography Architecture Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Java Certification Cryptography Architecture package online with Studyhub through our online learning platform. The Java Certification Cryptography Architecture bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Java Certification Cryptography Architecture course provides complete 360-degree training on Java Certification Cryptography Architecture. You'll get not one, not two, not three, but twenty-five Java Certification Cryptography Architecture courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Java Certification Cryptography Architecture courses are yours for as long as you want them once you enrol in this course This Java Certification Cryptography Architecture Bundle consists the following career oriented courses: * Course 01: Java Certification Cryptography Architecture * Course 02: jQuery Masterclass Course: JavaScript and AJAX Coding Bible * Course 03: SQL Programming * Course 04: PHP Web Development with MySQL * Course 05: Intermediate Python Coding * Course 06: Master JavaScript with Data Visualization * Course 07: Learn MySQL from Scratch for Data Science and Analytics * Course 08: ASP.Net MVC and Entity Framework * Course 09: Building a TodoMVC Application in Vue, React and Angular * Course 10: Penetration Testing with OWASP ZAP: Mastery course * Course 11: Complete Web Development * Course 12: Start Your Career as Web Developer * Course 13: Learn Spring & Angular Material with a Full Web Application * Course 14: Node JS: API Development with Swagger Interface Description Language * Course 15: Mobile and Web Development with Ionic & Angular JS * Course 16: Web Applications for Specialisation on Development * Course 17: Secure Programming of Web Applications * Course 18: Web Application Penetration Testing * Course 19: Responsive Web Design * Course 20: C Programming Language * Course 21: C++ Programming * Course 22: Flutter & Dart Development Course * Course 23: Build Progressive Web Apps with Angular * Course 24: Learn How To Create a Web App for iPad * Course 25: Bash Scripting, Linux and Shell Programming The Java Certification Cryptography Architecture course has been prepared by focusing largely on Java Certification Cryptography Architecture career readiness. It has been designed by our Java Certification Cryptography Architecture specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Java Certification Cryptography Architecture Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Java Certification Cryptography Architecture bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Java Certification Cryptography Architecture Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Java Certification Cryptography Architecture Elementary modules, allowing our students to grasp each lesson quickly. The Java Certification Cryptography Architecture course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Java Certification Cryptography Architecture bundle, you really hit the jackpot. Here's what you get: * Step by step Java Certification Cryptography Architecture lessons * One to one assistance from Java Certification Cryptography Architectureprofessionals if you need it * Innovative exams to test your knowledge after the Java Certification Cryptography Architecturecourse * 24/7 customer support should you encounter any hiccups * Top-class learning portal * Unlimited lifetime access to all twenty-five Java Certification Cryptography Architecture courses * Digital Certificate, Transcript and student ID are all included in the price * PDF certificate immediately after passing * Original copies of your Java Certification Cryptography Architecture certificate and transcript on the next working day * Easily learn the Java Certification Cryptography Architecture skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This Java Certification Cryptography Architecture training is suitable for - * Students * Recent graduates * Job Seekers * Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Java Certification Cryptography Architecture REQUIREMENTS To participate in this Java Certification Cryptography Architecture course, all you need is - * A smart device * A secure internet connection * And a keen interest in Java Certification Cryptography Architecture CAREER PATH You will be able to kickstart your Java Certification Cryptography Architecture career because this course includes various courses as a bonus. This Java Certification Cryptography Architecture is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Java Certification Cryptography Architecture career opportunities. CERTIFICATES CPD ACCREDITED CERTIFICATE Digital certificate - Included * CPD Accredited e-Certificate - Free * CPD Accredited Hardcopy Certificate - Free * Enrolment Letter - Free * Student ID Card - Free

Java Certification Cryptography Architecture - CPD Certified
Delivered Online On Demand
£279

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. COURSE OUTLINE * Information Security Threats and Vulnerabilities * Information Security Attacks * Network Security Fundamentals * Identification, Authentication, and Authorization * Network Security Controls: Administrative Controls * Network Security Controls: Physical Controls * Network Security Controls: Technical Controls * Network Security Assessment Techniques and Tools * Application Security * Virtualization and Cloud Computing * Wireless Network Security * Mobile Device Security * Internet of Things (IoT) and Operational Technology (OT) Security * Cryptography * Data Security * Network Troubleshooting * Network Traffic Monitoring * Network Log Monitoring and Analysis * Incident Response * Computer Forensics * Business Continuity and Disaster Recovery * Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered Online6 days, Jun 10th, 13:00 + 1 more
£3495

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, Jun 17th, 13:00 + 8 more
£3395

Java Certification Cryptography Architecture

5.0(2)

By Studyhub UK

Embark on a journey into the world of Java cryptography with our course, 'Java Certification Cryptography Architecture.' This course is designed to provide a deep dive into the critical aspects of Java's cryptographic capabilities, offering a blend of theoretical knowledge and practical application. Start with the basics in our introductory section, which sets the stage for a deeper exploration of Java Cryptography Architecture. As you progress, the course meticulously unfolds the complexities of message digest algorithms, MAC (Message Authentication Code), and PBKDF2 (Password-Based Key Derivation Function 2). This course is not just about coding; it's a comprehensive guide to understanding and implementing Java-based cryptographic solutions in real-world applications. Advance through the curriculum and discover practical examples of hashing, both simple and real-world, enhancing your ability to secure data effectively. Delve into efficient stream-based hashing and learn how to implement robust password hashing using PBKDF2. The course also includes a section on commercial wrapper libraries, demonstrating the integration of Java cryptography in commercial applications. By the conclusion of the course, you'll not only be proficient in Java Cryptography Architecture but also equipped with the skills to apply these cryptographic techniques in various professional scenarios, ensuring data security and integrity. Learning Outcomes * Develop a foundational understanding of Java Cryptography Architecture. * Learn to implement hashing algorithms and message digest techniques in Java. * Gain expertise in creating and using MAC for data security. * Master the application of PBKDF2 for secure password hashing. * Understand the use of commercial wrapper libraries in Java cryptography. WHY CHOOSE THIS JAVA CERTIFICATION CRYPTOGRAPHY ARCHITECTURE COURSE? 1. Unlimited access to the course for a lifetime. 2. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. 3. Structured lesson planning in line with industry standards. 4. Immerse yourself in innovative and captivating course materials and activities. 5. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. 6. Flexibility to complete the Course at your own pace, on your own schedule. 7. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. 8. Unlock career resources for CV improvement, interview readiness, and job success. WHO IS THIS JAVA CERTIFICATION CRYPTOGRAPHY ARCHITECTURE COURSE FOR? * Software developers and programmers looking to specialize in Java cryptography. * IT professionals seeking to enhance their data security skills. * Computer science students interested in cryptography and data protection. * System architects designing secure Java-based applications. * Security enthusiasts keen on exploring Java's cryptographic capabilities. CAREER PATH * Java Developer: £25,000 - £50,000 * Software Engineer (Java): £30,000 - £60,000 * Information Security Analyst: £35,000 - £70,000 * Cryptography Engineer: £40,000 - £80,000 * Application Security Developer: £38,000 - £75,000 * Systems Architect (Java): £45,000 - £85,000 PREREQUISITES This Java Certification Cryptography Architecture does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Java Certification Cryptography Architecture was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CERTIFICATION After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. COURSE CURRICULUM Section 01: Introduction Introductory Lecture 00:02:00 Setup 00:03:00 Section 02: Java Cryptography Architecture: MessageDigest, MAC & PBKDF2 Simple Hashing Example 00:05:00 Real-world Hashing Example 00:07:00 Efficient Stream-Based Hashing 00:02:00 Message Authentication Code (MAC) 00:05:00 Secure Password Hashing with PBKDF2/PKCS#5 00:10:00 Section 03: Outro Commercial Wrapper Libraries: Demo 00:03:00 JCE Unlimited Strength Policy File Installation 00:03:00 Assignment Assignment - Java Certification Cryptography Architecture 00:00:00

Java Certification Cryptography Architecture
Delivered Online On Demand
£10.99

Java Cryptography Architecture: Secure Password Hashing

By Course Cloud

COURSE OVERVIEW The Java Cryptography Architecture: Secure Password Hashing course has been designed for junior and senior Java Developers who wish to gain a comprehensive understanding of the Java cryptography architecture. The knowledge provided in this course can be applied to web applications (Swing, AWT, SWT/RCP, JavaFX), Java-based desktop applications, and backend applications, as well as Android apps. Broken down into three core modules, this training program covers the key areas of Java cryptography architecture, through easy to follow video tutorials and instructor-led guidance. Study as a part-time or full-time learner and gain in-demand industry skills by learning from the experts. This best selling Java Cryptography Architecture: Secure Password Hashing has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Java Cryptography Architecture: Secure Password Hashing is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Java Cryptography Architecture: Secure Password Hashing is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Java Cryptography Architecture: Secure Password Hashing is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Java Cryptography Architecture: Secure Password Hashing, you will be awarded a certificate of completion  as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Java Cryptography Architecture: Secure Password Hashing will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Java Cryptography Architecture: Secure Password Hashing to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Java Cryptography Architecture: Secure Password Hashing
Delivered Online On Demand
£25

Java Certification Cryptography Architecture

By Apex Learning

OVERVIEW This comprehensive course on Java Certification Cryptography Architecture will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Java Certification Cryptography Architecture comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. HOW WILL I GET MY CERTIFICATE? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. WHO IS THIS COURSE FOR? There is no experience or previous qualifications required for enrolment on this Java Certification Cryptography Architecture. It is available to all students, of all academic backgrounds. REQUIREMENTS Our Java Certification Cryptography Architecture is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. CAREER PATH Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. COURSE CURRICULUM 4 sections • 10 lectures • 00:40:00 total length •Introductory Lecture: 00:02:00 •Setup: 00:03:00 •Simple Hashing Example: 00:05:00 •Real-world Hashing Example: 00:07:00 •Efficient Stream-Based Hashing: 00:02:00 •Message Authentication Code (MAC): 00:05:00 •Secure Password Hashing with PBKDF2/PKCS#5: 00:10:00 •Commercial Wrapper Libraries: Demo: 00:03:00 •JCE Unlimited Strength Policy File Installation: 00:03:00 •Assignment - Java Certification Cryptography Architecture: 00:00:00

Java Certification Cryptography Architecture
Delivered Online On Demand
£12

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

Java Cryptography Architecture: MessageDigest, MAC & PBKDF2

4.8(8)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Java Cryptography Architecture: MessageDigest, MAC & PBKDF2
Delivered Online On Demand
£25

Educators matching "Cryptography"

Show all 5