Get our Bestselling Ethical Hacker Course V13 for Only $12.99

For a limited time, check out some of our most popular courses for free on Udemy.  View Free Courses.

Certified Ethical Hacker (CEH) V12: Your Pathway to CEH Training For Certification

Course Level: Intermediate, Experienced
Duration: 56 Hrs 53 Min
Total Videos: 323 On-demand Videos

Master cybersecurity skills with this CEH v12 training designed for aspiring security professionals to perform ethical hacking, identify vulnerabilities, and strengthen organizational defenses.

Learning Objectives

01

Understand and apply ethical hacking principles, including risk management, incident management, and security laws.

02

Learn and apply concepts of footprinting and reconnaissance, including OSINT tools and advanced Google search techniques.

03

Gain knowledge on network scanning methods, discover various scan types, and learn to use scanning tools like Nmap.

04

Understand enumeration techniques, learn to execute different enumeration types, and apply countermeasures.

05

Learn to conduct vulnerability scanning and assessments, and understand how to analyze and mitigate vulnerabilities.

06

Develop skills to hack systems using various tools and frameworks, understand password attacks, and learn to maintain access post-exploitation.

07

Understand malware threats, learn to create and detect malware, and apply countermeasures to mitigate risks.

08

Learn to hack wireless networks, understand common Wi-Fi attacks, and apply countermeasures to secure wireless networks.

Course Description

Imagine you’re tasked with identifying vulnerabilities in a corporate network before malicious hackers can exploit them. You need to understand how attackers think, what tools they use, and how to defend against their tactics. Completing this CEH v12 training equips you with the essential skills to perform in-depth security assessments and strengthen your organization’s defenses.

This course covers all core aspects of ethical hacking aligned with the CEH certification, including the latest techniques found in the CEH v11 and v12 frameworks. You’ll learn to conduct footprinting, reconnaissance, and network scanning, then progress to system hacking, web application security, and mobile security testing. It’s a hands-on program designed to simulate real attack scenarios, so you gain practical experience that directly applies to cybersecurity roles and the CEH exam.

What sets this CEH training apart is its focus on real-world application. You won’t just memorize concepts—you’ll perform attacks in controlled environments, use the same tools as malicious hackers, and develop a mindset that anticipates and mitigates threats. This approach ensures you leave with confidence to handle security challenges on the job and to succeed in the certification process.

What You Will Learn

Throughout this CEH v12 training, you will develop the skills needed to identify, assess, and address vulnerabilities within diverse network environments. The curriculum is designed to make you proficient in key ethical hacking techniques and security best practices:

  • Perform detailed footprinting and reconnaissance to gather intelligence on target networks.
  • Use advanced network scanning tools to identify open ports, services, and potential entry points.
  • Apply ethical hacking methodologies to simulate attacks and evaluate system vulnerabilities.
  • Utilize common hacking tools like Nmap, Wireshark, and Metasploit to replicate attacker behaviors ethically.
  • Conduct web application security testing to find and exploit common vulnerabilities such as SQL injection and cross-site scripting.
  • Perform mobile platform security assessments to identify weaknesses in Android and iOS environments.
  • Implement threat modeling techniques to understand attack vectors and prioritize security controls effectively.
  • Develop incident response workflows to contain breaches and mitigate damage after a security incident.
  • Understand encryption fundamentals and how attackers leverage cryptography to compromise data security.
  • Analyze cyber threats by understanding attacker motives, techniques, and tactics, enabling proactive defense strategies.

Who This Course Is For

This CEH v12 training is ideal for cybersecurity professionals looking to deepen their understanding of ethical hacking or prepare for the CEH certification exam. It’s suitable for network administrators, security analysts, vulnerability assessors, penetration testers, and IT auditors. Participants should have foundational knowledge of networking concepts and basic security principles before starting this course. Experience with operating systems, TCP/IP protocols, or scripting is beneficial but not mandatory.

Why These Skills Matter

Mastering the skills taught in this CEH course positions you as a proactive defender in the cybersecurity landscape. The CEH certification is recognized globally and demonstrates your ability to think and act like an attacker—an essential trait for identifying vulnerabilities before they are exploited. Employers seek professionals who can perform comprehensive security assessments, develop mitigation strategies, and respond swiftly to incidents.

Beyond certification, these skills give you a competitive edge. You’ll be able to conduct thorough penetration tests, advise on security improvements, and contribute to a safer digital environment. As cyber threats grow more sophisticated, having practical, hands-on expertise makes you indispensable in any security team. Completing this CEH v12 training opens doors to roles in penetration testing, security consultancy, and incident response, setting the foundation for a successful cybersecurity career.

Who Benefits From This Course

  • Security professionals pursuing a career in Ethical Hacking
  • Individuals seeking to enhance their knowledge in cyber security
  • IT professionals interested in understanding hacking methodologies
  • Network administrators aiming to strengthen their network security
  • Professionals preparing for the Certified Ethical Hacker (CEH) exam
  • System administrators aiming to understand and mitigate hacking attempts
  • Risk management professionals seeking to understand cyber threat landscape
  • Information assurance officers interested in ethical hacking techniques
  • IT auditors wanting to understand the hacking process to better assess system vulnerabilities

Frequently Asked Questions

What is included in the CEH v12 certification training, and how does it prepare me for the exam?

The CEH v12 certification training provides a comprehensive curriculum designed to cover all core aspects of ethical hacking aligned with the latest CEH framework. It includes modules on footprinting, reconnaissance, network scanning, system hacking, web application security, mobile security testing, cryptography, and threat modeling. The course emphasizes hands-on practice through labs and real-world scenarios, allowing learners to apply techniques used by malicious hackers in a controlled environment.

This practical approach ensures you gain the skills needed to identify vulnerabilities, perform penetration tests, and develop mitigation strategies. The training also covers the latest attack vectors and defensive techniques, making it highly relevant for the CEH exam. By completing this course, you'll be well-prepared to answer exam questions related to penetration testing methodologies, security assessment tools like Nmap, Wireshark, and Metasploit, as well as web and mobile application vulnerabilities. The certification exam evaluates your ability to think like an attacker and defend against threats, and this training equips you with the knowledge and practical experience needed to succeed.

Which key topics and skills will I learn in the CEH v12 training?

The CEH v12 training covers a broad range of cybersecurity topics essential for ethical hacking and penetration testing. You will learn to perform detailed footprinting and reconnaissance to gather intelligence about target networks, utilizing tools like OSINT frameworks and Google hacking techniques. The course also teaches advanced network scanning with tools like Nmap, identifying open ports, services, and vulnerabilities.

Additional skills include exploiting common web application vulnerabilities such as SQL injection, cross-site scripting (XSS), and server misconfigurations. You will gain proficiency in system hacking techniques, mobile security assessments for Android and iOS, and cryptography fundamentals. The training emphasizes threat modeling, incident response, and understanding attacker tactics, which are critical for proactive defense. Overall, you will develop a practical skill set to identify, assess, and mitigate security weaknesses across diverse environments, aligning with the CEH exam objectives.

How does the CEH v12 certification impact my cybersecurity career prospects?

Obtaining the CEH v12 certification significantly enhances your career prospects in cybersecurity by validating your expertise in ethical hacking and security assessment. It demonstrates to employers that you possess the skills needed to identify vulnerabilities, perform penetration tests, and recommend robust security measures. The certification is globally recognized and respected across industries, opening doors to roles such as penetration tester, security analyst, vulnerability assessor, and security consultant.

Moreover, CEH certification equips you with practical skills that are highly valued in the field, giving you a competitive edge in a growing job market. Organizations are increasingly seeking professionals who can proactively defend against cyber threats and respond effectively to incidents. Holding a CEH v12 credential positions you as a knowledgeable and capable cybersecurity professional, boosting your credibility and potential for career advancement in roles that involve security assessment, threat hunting, and incident management.

What are the best strategies to prepare for the CEH v12 exam using this course?

The most effective way to prepare for the CEH v12 exam with this course is to actively engage in all hands-on labs and practical activities. Practicing with tools like Nmap, Wireshark, Metasploit, and web application testing frameworks will reinforce your understanding of attack and defense techniques. Additionally, reviewing the key concepts and modules regularly, especially topics like footprinting, network scanning, and web vulnerabilities, helps solidify your knowledge.

Complement your course learning by studying the official CEH exam blueprint to identify core areas of focus. Joining study groups or forums can provide insights and clarification on complex topics. Taking practice exams and mock tests is also crucial—they help assess your readiness and highlight areas needing improvement. Combining theoretical knowledge with practical exercises from the course ensures you develop both understanding and confidence to pass the CEH v12 exam successfully.

What prerequisites or prior knowledge do I need before starting CEH v12 training?

While there are no strict prerequisites for enrolling in the CEH v12 training, having a foundational understanding of networking concepts, operating systems, and basic security principles is highly recommended. Familiarity with TCP/IP protocols, system administration, and scripting can significantly enhance your learning experience and enable you to grasp advanced topics more easily.

Experience with operating systems like Windows and Linux, along with basic knowledge of cybersecurity threats and defense mechanisms, will help you maximize the benefits of this hands-on course. If you're new to cybersecurity, it might be helpful to review introductory materials on networking and security fundamentals before starting the CEH training. This preparation ensures you can follow along with the modules effectively and develop the skills needed to succeed in the certification and practical applications.

Included In This Course

Module 1 - Introduction To Ethical Hacking

  •    1.0 Introduction to CEH v12
  •    1.1 Elements of Security
  •    1.2 Cyber Kill Chain
  •    1.3 MITRE ATT&CK Framework
  •    1.3.1 Activity - Researching the MITRE ATTACK Framework
  •    1.4 Hacking
  •    1.5 Ethical Hacking
  •    1.6 Information Assurance
  •    1.7 Risk Management
  •    1.8 Incident Management
  •    1.9 Information Security Laws and Standards
  •    1.10 Introduction to Ethical Hacking Review

Module 2: Footprinting and Reconnaissance

  •    2.1 Footprinting Concepts
  •    2.2 OSINT Tools
  •    2.2.1 Activity - Conduct OSINT with OSR Framework
  •    2.2.2 Activity - OSINT with theHarvester
  •    2.2.3 Activity - Add API Keys to theHarvester
  •    2.2.4 Activity - Extract Document Metadata with FOCA
  •    2.2.5 Activity - Extract Document Metadata with FOCA
  •    2.3 Advanced Google Search
  •    2.3.1 Activity - Google Hacking
  •    2.4 Whois Footprinting
  •    2.4.1 Activity - Conducting Whois Research
  •    2.5 DNS Footprinting
  •    2.5.1 Activity - Query DNS with NSLOOKUP
  •    2.6 Website Footprinting
  •    2.6.1 Activity - Fingerprint a Webserver with ID Serve
  •    2.6.2 Activity - Extract Data from Websites
  •    2.6.3 Activity - Mirror a Website with HTTrack
  •    2.7 Email Footprinting
  •    2.7.1 Activity - Trace a Suspicious Email
  •    2.8 Network Footprinting
  •    2.9 Social Network Footprinting
  •    2.10 Footprinting and Reconnaissance Countermeasures
  •    2.11 Footprinting and Reconnaissance Review

Module 3: Scanning Networks

  •    3.1 Scanning Concepts
  •    3.2 Discovery Scans
  •    3.2.1 Activity - ICMP ECHO and ARP Pings
  •    3.2.2 Activity - Host Discovery with Angry IP Scanner
  •    3.3 Port Scans
  •    3.3.1 Activity - Port Scan with Angry IP Scanner
  •    3.4 Other Scan Types
  •    3.5 Scanning Tools
  •    3.5.1 Activity - Hping3 Packet Crafting
  •    3.5.2 Activity - Fingerprinting with Zenmap
  •    3.6 NMAP
  •    3.6.1 Activity - Nmap Basic Scans
  •    3.6.2 Activity - Host Discovery with Nmap
  •    3.6.3 - Activity - Nmap Version Detection
  •    3.6.4 Activity - Nmap Idle (Zombie) Scan
  •    3.6.5 Activity - Nmap FTP Bounce Scan
  •    3.6.6 - Activity - NMAP Scripts
  •    3.7 Firewall and IDS Evasion
  •    3.7.1 Activity - Nmap Advanced Scans
  •    3.8 Proxies
  •    3.9 Scanning Countermeasures
  •    3.10 Scanning Networks Review

Module 4: Enumeration

  •    4.1 Enumeration Overview
  •    4.2 SMB_NetBIOS_Enumeration
  •    4.2.1 Activity - Enumerate NetBIOS Information with Hyena
  •    4.3 File Transfer Enumeration
  •    4.4 WMI Enumeration
  •    4.4.1 - Activity - Enumerating WMI with Hyena
  •    4.5 SNMP Enumeration
  •    4.5.1 Activity - Enumerate WMI, SNMP and Other Information Using SoftPerfect
  •    4.6 LDAP Enumeration
  •    4.7 DNS Enumeration
  •    4.8 SMTP Enumeration
  •    4.8.1 Activity - Enumerate Email Users with SMTP
  •    4.9 Remote Connection Enumeration
  •    4.10 Website Enumeration
  •    4.10.1 Activity - Enumerate a Website with DirBuster
  •    4.11 Other Enumeration Types
  •    4.12 Enumeration Countermeasures and Review

Module 5: Vulnerability Analysis

  •    5.1 Vulnerability Scanning
  •    5.1.1 Vulnerability Scanning with OpenVAS
  •    5.2 Vulnerability Assessment
  •    5.3 Vulnerability Analysis Review

Module 6: System Hacking

  •    6.1 System Hacking Concepts
  •    6.2 Common OS Exploits
  •    6.3 Buffer Overflows
  •    6.3.1 Activity - Performing a Buffer Overflow
  •    6.4 System Hacking Tools and Frameworks
  •    6.4.1 Activity - Hack a Linux Target from Start to Finish
  •    6.5 Metasploit
  •    6.5.1 Activity - Get Started with Metasploit
  •    6.6 Meterpreter
  •    6.7 Keylogging and Spyware
  •    6.7.1 Activity - Keylogging with Meterpreter
  •    6.8 Netcat
  •    6.8.1 Activity - Using Netcat
  •    6.9 Hacking Windows
  •    6.9.1 Activity - Hacking Windows with Eternal Blue
  •    6.10 Hacking Linux
  •    6.11 Password Attacks
  •    6.11.1 Activity - Pass the Hash
  •    6.11.2 Activity - Password Spraying
  •    6.12 Password Cracking Tools
  •    6.13 Windows Password Cracking
  •    6.13.1 Activity - Cracking Windows Passwords
  •    6.13.2 Activity - Cracking Password Hashes with Hashcat
  •    6.14 Linux Password Cracking
  •    6.15 Other Methods for Obtaining Passwords
  •    6.16 Network Service Attacks
  •    6.16.1 Activity - Brute Forcing a Network Service with Medusa
  •    6.17 Post Exploitation
  •    6.18 Pivoting
  •    6.18.1 & 6.18.2 Activity - Pivoting Setup and Attack
  •    6.19 Maintaining Access
  •    6.19.1 Activity - Persistence
  •    6.20 Hiding Data
  •    6.20.1 Activity - Hiding Data Using Least Significant Bit Steganography
  •    6.21 Covering Tracks
  •    6.21.1 Activity - Clearing Tracks in Windows
  •    6.21.2 Activity - View and Clear Audit Policies with Auditpol
  •    6.22 System Hacking Countermeasures
  •    6.23 System Hacking Review

Module 7: Malware Threats

  •    7.1 Malware Overview
  •    7.2 Viruses
  •    7.3 Trojans
  •    7.3.1 Activity - Deploying a RAT
  •    7.4 Rootkits
  •    7.5 Other Malware
  •    7.6 Advanced Persistent Threat
  •    7.7 Malware Makers
  •    7.7.1 Activity - Creating a Malware Dropper and Handler
  •    7.8 Malware Detection
  •    7.9 Malware Analysis
  •    7.9.1 Activity - Performing a Static Code Review
  •    7.9.2 Activity - Analyzing the SolarWinds Orion Hack
  •    7.10 Malware Countermeasures
  •    7.11 Malware Threats Review

Module 8: Sniffing

  •    8.1 Network Sniffing
  •    8.2 Sniffing Tools
  •    8.2.1 Activity- Sniffing HTTP with Wireshark
  •    8.2.2 Activity - Capturing Files from SMB
  •    8.3 ARP and MAC Attacks
  •    8.3.1 Activity - Performing an MITM Attack with Ettercap
  •    8.4 Name Resolution Attacks
  •    8.4.1 Activity - Spoofing Responses with Responder
  •    8.5 Other Layer 2 Attacks
  •    8.6 Sniffing Countermeasures
  •    8.7 Sniffing Review

Module 9: Social Engineering

  •    9.1 Social Engineering Concepts
  •    9.2 Social Engineering Techniques
  •    9.2.1 Activity - Deploying a Baited USB Stick
  •    9.2.2 Activity - Using an O.MG Lightning Cable
  •    9.3 Social Engineering Tools
  •    9.3.1 Activity - Phishing for Credentials
  •    9.4 Social Media, Identity Theft, Insider Threats
  •    9.5 Social Engineering Countermeasures
  •    9.6 Social Engineering Review

Module 10: Denial-of-Service

  •    10.1 DoS-DDoS Concepts
  •    10.2 Volumetric Attacks
  •    10.3 Fragmentation Attacks
  •    10.4 State Exhaustion Attacks
  •    10.5 Application Layer Attacks
  •    10.5.1 Activity - Performing a LOIC Attack
  •    10.5.2 Activity - Performing a HOIC Attack
  •    10.5.3 Activity - Conducting a Slowloris Attack
  •    10.6 Other Attacks
  •    10.7 DoS Tools
  •    10.8 DoS Countermeasures
  •    10.9 DoS Review

Module 11: Session Hijacking

  •    11.1 Session Hijacking
  •    11.2 Compromising a Session Token
  •    11.3 XSS
  •    11.4 CSRF
  •    11.5 Other Web Hijacking Attacks
  •    11.6 Network-Level Session Hijacking
  •    11.6.1 Activity - Hijack a Telnet Session
  •    11.7 Session Hijacking Tools
  •    11.8 Session Hijacking Countermeasures
  •    11.9 Session Hijacking Review

Module 12: Evading IDS, Firewalls, and Honeypots

  •    12.1 Types of IDS
  •    12.2 Snort
  •    12.3 System Logs
  •    12.4 IDS Considerations
  •    12.5 IDS Evasion
  •    12.5.1 Activity - Fly Below IDS Radar
  •    12.6 Firewalls
  •    12.7 Packet Filtering Rules
  •    12.8 Firewall Deployments
  •    12.9 Split DNS
  •    12.10 Firewall Product Types
  •    12.11 Firewall Evasion
  •    12.11.1 Activity - Use Social Engineering to Bypass a Windows Firewall
  •    12.11.2 Activity - Busting the DOM for WAF Evasion
  •    12.12 Honeypots
  •    12.13 Honeypot Detection and Evasion
  •    12.13.1 Activity - Test and Analyze a Honey Pot
  •    12.14 Evading IDS, Firewalls, and Honeypots Review

Module 13: Hacking Web Servers

  •    13.1 Web Server Operations
  •    13.2 Hacking Web Servers
  •    13.3 Common Web Server Attacks
  •    13.3.1 Activity - Defacing a Website
  •    13.4 Web Server Attack Tools
  •    13.5 Hacking Web Servers Countermeasures
  •    13.6 Hacking Web Servers Review

Module 14: Hacking Web Applications

  •    14.1 Web Application Concepts
  •    14.2 Attacking Web Apps
  •    14.3 A01 Broken Access Control
  •    14.4 A02 Cryptographic Failures
  •    14.5 A03 Injection
  •    14.5.1 Activity - Command Injection
  •    14.6 A04 Insecure Design
  •    14.7 A05 Security Misconfiguration
  •    14.8 A06 Vulnerable and Outdated Components
  •    14.9 A07 Identification and Authentication Failures
  •    14.10 A08 Software and Data integrity Failures
  •    14.11 A09 Security Logging and Monitoring Failures
  •    14.12 A10 Server-Side Request Forgery
  •    14.13 XSS Attacks
  •    14.13.1 Activity - XSS Walkthrough
  •    14.13.2 Activity - Inject a Malicious iFrame with XXS
  •    14.14 CSRF
  •    14.15 Parameter Tampering
  •    14.15.1 Activity - Parameter Tampering with Burp
  •    14.16 Clickjacking
  •    14.17 SQL Injection
  •    14.18 Insecure Deserialization Attacks
  •    14.19 IDOR
  •    14.19.1 Activity - Hacking with IDOR
  •    14.20 Directory Traversal
  •    14.21 Session Management Attacks
  •    14.22 Response Splitting
  •    14.23 Overflow Attacks
  •    14.24 XXE Attacks
  •    14.25 Web App DoS
  •    14.26 Soap Attacks
  •    14.27 AJAX Attacks
  •    14.28 Web API Hacking
  •    14.29 Webhooks and Web Shells
  •    14.30 Web App Hacking Tools
  •    14.31 Hacking Web Applications Countermeasures
  •    14.32 Hacking Web Applications Review

Module 15: SQL Injection

  •    15.1 SQL Injection Overview
  •    15.2 Basic SQL Injection
  •    15.3 Finding Vulnerable Websites
  •    15.4 Error-based SQL Injection
  •    15.5 Union SQL Injection
  •    15.5.1 Activity - Testing SQLi on a Live Website - Part 1
  •    15.5.2 Activity - Testing SQLi on a Live Website - Part 2
  •    15.6 Blind SQL Injection
  •    15.7 SQL Injection Tools
  •    15.7.1 Activity - SQL Injection Using SQLmap
  •    15.8 Evading Detection
  •    15.9 Analyzing SQL Injection
  •    15.10 SQL Injection Countermeasures
  •    15.11 SQL Injection Review

Module 16: Hacking Wireless Networks

  •    16.1 Wireless Concepts
  •    16.2 Wireless Security Standards
  •    16.3 WI-FI Discovery Tools
  •    16.4 Common Wi-Fi Attacks
  •    16.5 Wi-Fi Password Cracking
  •    16.6 WEP Cracking
  •    16.6.1 Activity - Cracking WEP
  •    16.7 WPA,WPA2,WPA3 Cracking
  •    16.7.1 Activity - WPA KRACK Attack
  •    16.8 WPS Cracking
  •    16.9 Bluetooth Hacking
  •    16.10 Other Wireless Hacking
  •    16.10.1 Activity - Cloning an RFID badge
  •    16.10.2 Activity - Hacking with a Flipper Zero
  •    16.11 Wireless Security Tools
  •    16.12 Wireless Hacking Countermeasures
  •    16.13 Hacking Wireless Networks Review

Module 17: Hacking Mobile Platforms

  •    17.1 Mobile Device Overview
  •    17.2 Mobile Device Attacks
  •    17.3 Android Vulnerabilities
  •    17.4 Rooting Android
  •    17.5 Android Exploits
  •    17.5.1 Activity - Hacking Android
  •    17.5.2 Activity - Using a Mobile Device in a DDoS Campaign
  •    17.6 Android-based Hacking Tools
  •    17.7 Reverse Engineering an Android App
  •    17.8 Securing Android
  •    17.9 iOS Overview
  •    17.10 Jailbreaking iOS
  •    17.11 iOS Exploits
  •    17.12 iOS-based Hacking Tools
  •    17.13 Reverse Engineering an iOS App
  •    17.14 Securing iOS
  •    17.15 Mobile Device Management
  •    17.16 Hacking Mobile Platforms Countermeasures
  •    17.17 Hacking Mobile Platforms Review

Module 18: IoT AND OT Hacking

  •    18.1 IoT Overview
  •    18.2 IoT Infrastructure
  •    18.3 IoT Vulnerabilities and Threats
  •    18.3.1 Activity - Searching for Vulnerable IoT Devices
  •    18.4 IoT Hacking Methodology and Tools
  •    18.5 IoT Hacking Countermeasures
  •    18.6 OT Concepts
  •    18.7 IT-OT Convergence
  •    18.8 OT Components
  •    18.9 OT Vulnerabilities
  •    18.10 OT Attack Methodology and Tools
  •    18.11 OT Hacking Countermeasures
  •    18.12 IoT and OT Hacking Review

Module 19: Cloud Computing

  •    19.1 Cloud Computing Concepts
  •    19.2 Cloud Types
  •    19.3 Cloud Benefits and Considerations
  •    19.4 Cloud Risks and Vulnerabilities
  •    19.5 Cloud Threats and Countermeasures
  •    19.5.1 Activity - Hacking S3 Buckets
  •    19.6 Cloud Security Tools And Best Practices
  •    19.7 Cloud Computing Review

Module 20: Cryptography

  •    20.1 Cryptography Concepts
  •    20.2 Symmetric Encryption
  •    20.2.1 Activity - Symmetric Encryption
  •    20.3 Asymmetric Encryption
  •    20.3.1 Activity - Asymmetric Encryption
  •    20.4 Public Key Exchange
  •    20.5 PKI
  •    20.5.1 Activity - Generating and Using an Asymmetric Key Pair
  •    20.6 Digital Signatures
  •    20.7 Hashing
  •    20.7.1 Activity - Calculating Hashes
  •    20.8 Common Cryptography Use Cases
  •    20.9 Cryptography Tools
  •    20.10 Cryptography Attacks
  •    20.11 Cryptography Review
  •    20.12 Course Conclusion