Ethical Hacking: Cryptography https://www.lynda.com/IT-tutorials/Ethical-Hacking-Cryptography/2813285-2.html While the science of cryptography—in which data is mathematically scrambled—has roots...
Introduction 1. Cryptography Basics 2. Ciphers 3. Hashing 4. Digital Certificates 5. Public Key Infrastructure (PKI) 6. Applied Uses of Cryptography 7. Cryptographic Attacks Conclusion