CIS 1620 Intro to Cryptography

(CIS-1620)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Encryption and Hashing Concepts

  • Cryptography Concepts
  • Encryption Algorithms
  • Hashing Basics
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
2

PKI and Encryption Protocols

  • Public Key Infrastructure
  • Security Protocols
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
3

Cryptographic Attacks and Defenses

  • Functions of Cryptography
  • History of Cryptography
  • Algorithms
  • Public Key Infrastructure
  • Protocols, Applications, and Attacks
  • Summary
  • Review All Key Topics
  • Exercises
  • Suggested Reading and Resources
4

Industrial Espionage in Cyberspace

  • Introduction
  • What Is Industrial Espionage?
  • Information as an Asset
  • Real-World Examples of Industrial Espionage
  • How Does Espionage Occur?
  • Steganography Used in Industrial Espionage
  • Phone Taps and Bugs
  • Protecting Against Industrial Espionage
  • Industrial Espionage Act
  • Spear Phishing
  • Summary
5

Encryption

  • Introduction
  • Cryptography Basics
  • History of Encryption
  • Modern Methods
  • Public Key (Asymmetric) Encryption
  • PGP
  • Legitimate Versus Fraudulent Encryption Methods
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Steganography
  • Cryptanalysis
  • Cryptography Used on the Internet
  • Summary
6

Cryptography

  • Cryptography Basics
  • History of Encryption
  • Modern Methods
  • Public Key (Asymmetric) Encryption
  • Digital Signatures
  • Hashing
  • MAC and HMAC
  • Password Crackers
  • Steganography
  • Cryptanalysis
  • Learning More
  • Summary
  • Test Your Skills
7

Reconnaissance

  • Passive Scanning Techniques
  • Active Scanning Techniques
  • Wireshark
  • Maltego
  • Other OSINT Tools
  • Summary
  • Test Your Skills
8

Hacking Windows

  • Windows Details
  • Windows Password Hashing
  • Windows Hacking Techniques
  • Windows Scripting
  • Windows Password Cracking
  • Detecting Malware in Windows
  • Cain and Abel
  • Summary
  • Test Your Skills
9

Introduction to Linux

  • Linux History
  • Linux Commands
  • Directories
  • Graphical User Interface
  • Summary
  • Test Your Skills
10

Linux Hacking

  • More on the Linux OS
  • Linux Firewall
  • Syslogd
  • Scripting
  • Linux Passwords
  • Linux Hacking Tricks
  • Summary
  • Test Your Skills
11

Introduction to Kali Linux

  • Kali Linux History
  • Kali Basics
  • Kali Tools
  • Summary
  • Test Your Skills
12

General Hacking Techniques

  • Wi-Fi Testing
  • Social Engineering
  • DoS
  • Summary
  • Test Your Skills
13

Introduction to Metasploit

  • Background on Metasploit
  • Getting Started with Metasploit
  • Basic Usage of msfconsole
  • Scanning with Metasploit
  • How to Use Exploits
  • Exploit Examples
  • Post Exploits
  • Summary
  • Test Your Skills
14

More with Metasploit

  • Meterpreter and Post Exploits
  • msfvenom
  • More Metasploit Attacks
  • Summary
  • Test Your Skills

1

Encryption and Hashing Concepts

  • Observing MD5 Hash
2

PKI and Encryption Protocols

  • Configuring SSL Connections
  • Configuring the SSL Port Setting
  • Using OpenSSL to Create a Public/Private Key Pair
  • Adding a Certificate to MMC
3

Cryptographic Attacks and Defenses

  • Examining an SSL Certificate
  • Observing MD5 Hash
  • Using Openssl to Create a Public/Private Keypair
  • Encrypting and Decrypting a Message
  • Using PGP
4

Encryption

  • Using data encryption recovery agent
  • Encrypting and decrypting using CrypTool
  • Using AES encryption and decryption
  • Running and installing HashCalc
  • Installing and using MD5 calculator
5

Cryptography

  • Using OpenSSL to Create a Public/Private Key Pair
  • Observing an SHA-Generated Hash Value
  • Observing an MD5-Generated Hash Value
  • Using Cain and Abel
  • Using DeepSound
6

Reconnaissance

  • Detecting a Phishing Site Using Netcraft
  • Searching with builtwith.com
  • Observing a Website Using archive.org
  • Using Censys
  • Scanning Live Systems Using Nmap
  • Scanning an OS Using Nmap
  • Scanning a Port Using nmap
  • Enumerating Data Using enum4linux
  • Capturing Packets Using Wireshark
  • Footprinting a Website
7

Hacking Windows

  • Covering Tracks
  • Using the net Command
  • Cracking Windows Password Using Ophcrack
  • Cracking a Linux Password Using John the Ripper
8

Introduction to Linux

  • Using Basic Linux Commands
9

Linux Hacking

  • Creating a Personal Linux Firewall Using iptables
  • Writing Bash Shell Script
10

Introduction to Kali Linux

  • Installing Kali Linux
  • Using Sparta
11

General Hacking Techniques

  • Performing a DoS Attack with the SYN Flood
12

Introduction to Metasploit

  • Searching Vulnerability Using Metasploit
  • Grabbing a Screenshot of a Target Machine Using Metasploit
  • Scanning Ports Using Metasploit
  • Causing a Darkcomet trojan infection
  • Create Unlimited Folders in a Victim Machine using Metasploit
  • Hiding a Remote Machine Disk Using Metasploit
13

More with Metasploit

  • Hacking Windows Using Metasploit
  • Enabling a Keylogger in a Target Machine
  • Enabling Payload on a Target Machine Using Metasploit
  • Getting a Persistence Session of Metasploit
scroll to top