Video Description

As we wrap up our lesson on Cryptography, we spend our last section exploring Asymmetric Cryptography in detail with several labs to supplement the lecture knowledge. A penetration tester must be able to understand what happens at each stage of encryption/decryption phase and how those transactions affect or trigger the outcomes of other events. In this session, we learn how Asymmetric Cryptography delivers all four encryption services: privacy, authenticity, integrity, non-repudiation (PAIN). We'll then we find out what happens at each state of asymmetric cryptography. At the conclusion of this lesson, you'll know what info is exchanged between public and private key, how packet verification occurs, how a hash is created and how hashing algorithms are used.

Course Modules

Instructed By

Instructor Profile Image
Kelly H

PMP, CISSP, CASP, CEH - Professional Trainer, Top 100 Trainers World-Wide



Subscribe to become an Insider Pro and get access to premium content such as:

Unlimited access to 700+ apps, including virtual labs, practice tests, capture-the-flag challenges, and more
Industry certification preparation
Guided Mentor
Premium support