
Encryption is everywhere (well, almost everywhere) around sensitive data in motion and, sometimes, sensitive data at rest. Without it, e-commerce transactions, government secrets and electronic medical records – and many other types of data – could not safely exist. Data is a precious resource in the electronic economy and, like every precious resource, it needs perpetual protection.
As a member of the Cybrary community, you likely already knew this. Yet, as you continue to build your cybersecurity skills, do you know enough about encryption to be effective as an ethical hacker/pentester?
Think about four concepts regarding the use of encryption. In your cyber efforts, you should maintain a ongoing exploration of:
- Why companies encrypt data
- The various encryption options companies may employ
- The evolving technologies used in encryption
- How to implement encryption for a variety of uses
Studying and applying these concepts will likely be a part of your continued journey as a pentester/ethical hacker. In your quest for knowledge about encryption, where would you search?
I spend a lot of time searching Cybrary’s site and have put together a short list of content you might find useful. There are other helpful resources on the site as well. If you find some you like, please share them in the comments section. Here’s the list:
I hope the concepts and content are helpful on your path towards greater effectiveness with encryption. And, by the way, if you haven’t already taken the Penetration Testing and Ethical Hacking class, check it out.
No comments:
Post a Comment