• Online, Self-Paced
Course Description

Discover various approaches that can be used to attack a cryptographic system, such as analytic, implementation, brute force, ciphertext only, meet in the middle, and replay attacks.

Learning Objectives

Certified Ethical Hacker - CEHv10: Cryptography Attacks

  • describe the various approaches that can be used to attack a cryptographic system

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.