Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
As we wrap up our lesson on Cryptography, we spend our last section exploring Asymmetric Cryptography in detail with several labs to supplement the lecture knowledge. A penetration tester must be able to understand what happens at each stage of encryption/decryption phase and how those transactions affect or trigger the outcomes of other events. In this session, we learn how Asymmetric Cryptography delivers all four encryption services: privacy, authenticity, integrity, non-repudiation (PAIN). We'll then we find out what happens at each state of asymmetric cryptography. At the conclusion of this lesson, you'll know what info is exchanged between public and private key, how packet verification occurs, how a hash is created and how hashing algorithms are used.