Free Ethical Hacking Tutorial – Applied cryptography hacking and network cyber security

- 44%

0
Certificate

Free

Language

Level

Intermediate

Last updated on April 20, 2025 1:46 am

Learn modern cryptography and key exchange in this Udemy course. Implement and break fundamental protocols like Diffie-Hellman, SRP, and RSA. Gain hands-on experience in Python and defend against attacks. Suitable for all levels.

Add your review

_______course still on creation________

Welcome to Cryptography and Key Exchange, a Udemy course that will take you on a journey through the world of modern cryptography. In this course, you will learn how to implement and break some of the most fundamental cryptographic protocols, including Diffie-Hellman key exchange, Secure Remote Password (SRP), and RSA encryption.

Through a series of hands-on programming challenges, you will gain a deep understanding of how these protocols work and how they can be attacked. You will learn how to implement them in code using a programming language like Python, and how to detect and defend against common cryptographic attacks like man-in-the-middle (MITM) attacks, dictionary attacks, and broadcast attacks.

Here’s what you’ll learn in this course:

  • The principles of key exchange and how the Diffie-Hellman protocol works

  • How to implement Diffie-Hellman key exchange in Python

  • How to perform a MITM attack on Diffie-Hellman and how to defend against it

  • How to negotiate group parameters for the Diffie-Hellman protocol and how to detect and defend against attacks using malicious “g” parameters

  • The principles of password-authenticated key agreement (PAKE) protocols and how the Secure Remote Password (SRP) protocol works

  • How to implement the SRP protocol in Python

  • How to exploit vulnerabilities in the SRP protocol, including attacks using zero keys and dictionary attacks

  • The principles of RSA encryption and how the RSA algorithm works

  • How to implement RSA encryption in Python

  • How to perform a broadcast attack on RSA ciphertexts with small public exponents and how to defend against it

By the end of this course, you will have a solid understanding of the principles of modern cryptography and key exchange, and you will have gained practical experience in implementing and breaking some of the most fundamental cryptographic protocols.

Who this course is for:

  • All level

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Free Ethical Hacking Tutorial – Applied cryptography hacking and network cyber security”

×

    Your Email (required)

    Report this page
    Free Ethical Hacking Tutorial – Applied cryptography hacking and network cyber security
    Free Ethical Hacking Tutorial – Applied cryptography hacking and network cyber security
    LiveTalent.org
    Logo
    LiveTalent.org
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.