Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Certified Ethical Hacker (CEH): Unit 7

via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This course covers cloud security and cryptographic practices. You will explore the dynamic world of cloud computing, gaining insights into common vulnerabilities, security assessment techniques, and strategies for safeguarding cloud-based assets. You will learn about cryptography, including encryption algorithms, cryptanalysis, and the critical role of cryptography in securing data both at rest and in transit. You will learn about the intersection of cloud computing and cryptography, including encryption methods used in cloud environments and emerging post-quantum cryptography algorithms. By the end of this course, you will be proficient in implementing security measures in cloud and cryptographic contexts.

Syllabus

  • Cloud Computing and Cryptography
    • This module covers cloud computing and cryptography. These technologies are fundamentals in how we store, process, and protect data. The cloud has changed how businesses and individuals store and access data, and run applications. You will learn about common vulnerabilities in cloud environments, techniques for assessing cloud security, and strategies for securing cloud-based assets. You will also learn about how cloud computing and cryptography (the art and science of securing communications and data) intersect in data encryption, and about methods used to encrypt data in transit. You will also be introduced to the new post-quantum cryptography algorithms.

Taught by

Pearson and Nick Garner

Reviews

Start your review of Certified Ethical Hacker (CEH): Unit 7

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.