Ethical Hacking

  1. Cryptography and Cryptanalysis
    1. Fundamental Cryptographic Concepts
      1. Cryptographic Objectives
        1. Confidentiality Assurance
          1. Data Integrity Protection
            1. Authentication Verification
              1. Non-Repudiation Guarantee
              2. Cryptographic Terminology
                1. Plaintext and Ciphertext
                  1. Encryption and Decryption
                    1. Keys and Key Space
                      1. Cryptographic Algorithms
                      2. Cryptographic Principles
                        1. Kerckhoffs's Principle
                          1. Perfect Secrecy
                            1. Computational Security
                              1. Provable Security
                            2. Symmetric Cryptography
                              1. Stream Ciphers
                                1. Stream Cipher Principles
                                  1. Linear Feedback Shift Registers
                                    1. RC4 Algorithm
                                      1. ChaCha20 Algorithm
                                      2. Block Ciphers
                                        1. Block Cipher Principles
                                          1. Data Encryption Standard
                                            1. DES Algorithm Structure
                                              1. DES Vulnerabilities
                                                1. Triple DES
                                                2. Advanced Encryption Standard
                                                  1. AES Algorithm Structure
                                                    1. AES Key Sizes
                                                      1. AES Implementation
                                                      2. Block Cipher Modes
                                                        1. Electronic Codebook Mode
                                                          1. Cipher Block Chaining Mode
                                                            1. Counter Mode
                                                              1. Galois/Counter Mode
                                                            2. Symmetric Key Management
                                                              1. Key Generation
                                                                1. Key Distribution
                                                                  1. Key Storage
                                                                    1. Key Rotation
                                                                  2. Asymmetric Cryptography
                                                                    1. Public Key Cryptography Principles
                                                                      1. Mathematical Foundations
                                                                        1. Key Pair Generation
                                                                          1. Public Key Distribution
                                                                          2. RSA Algorithm
                                                                            1. RSA Key Generation
                                                                              1. RSA Encryption and Decryption
                                                                                1. RSA Digital Signatures
                                                                                  1. RSA Security Considerations
                                                                                  2. Elliptic Curve Cryptography
                                                                                    1. Elliptic Curve Mathematics
                                                                                      1. ECC Key Generation
                                                                                        1. ECDSA Digital Signatures
                                                                                          1. ECC Advantages and Disadvantages
                                                                                          2. Diffie-Hellman Key Exchange
                                                                                            1. Key Exchange Protocol
                                                                                              1. Discrete Logarithm Problem
                                                                                                1. Elliptic Curve Diffie-Hellman
                                                                                              2. Cryptographic Hash Functions
                                                                                                1. Hash Function Properties
                                                                                                  1. Deterministic Output
                                                                                                    1. Fixed Output Size
                                                                                                      1. Avalanche Effect
                                                                                                        1. Irreversibility
                                                                                                        2. Common Hash Algorithms
                                                                                                          1. MD5 Algorithm
                                                                                                            1. MD5 Structure
                                                                                                              1. MD5 Vulnerabilities
                                                                                                              2. SHA Family
                                                                                                                1. SHA-1 Algorithm
                                                                                                                  1. SHA-2 Family
                                                                                                                    1. SHA-3 Algorithm
                                                                                                                  2. Hash Function Applications
                                                                                                                    1. Data Integrity Verification
                                                                                                                      1. Password Storage
                                                                                                                        1. Digital Signatures
                                                                                                                          1. Proof of Work Systems
                                                                                                                        2. Digital Signatures and PKI
                                                                                                                          1. Digital Signature Schemes
                                                                                                                            1. RSA Signatures
                                                                                                                              1. DSA Signatures
                                                                                                                                1. ECDSA Signatures
                                                                                                                                2. Public Key Infrastructure
                                                                                                                                  1. Certificate Authorities
                                                                                                                                    1. Digital Certificates
                                                                                                                                      1. X.509 Certificate Format
                                                                                                                                        1. Certificate Validation
                                                                                                                                          1. Certificate Revocation
                                                                                                                                          2. Trust Models
                                                                                                                                            1. Hierarchical Trust Model
                                                                                                                                              1. Web of Trust Model
                                                                                                                                                1. Bridge Trust Model
                                                                                                                                              2. PKI Implementation
                                                                                                                                                1. Certificate Enrollment
                                                                                                                                                  1. Certificate Management
                                                                                                                                                    1. Key Recovery and Escrow
                                                                                                                                                  2. Cryptanalysis Techniques
                                                                                                                                                    1. Classical Cryptanalysis
                                                                                                                                                      1. Frequency Analysis
                                                                                                                                                        1. Pattern Analysis
                                                                                                                                                          1. Known Plaintext Attacks
                                                                                                                                                            1. Chosen Plaintext Attacks
                                                                                                                                                            2. Modern Cryptanalysis
                                                                                                                                                              1. Differential Cryptanalysis
                                                                                                                                                                1. Linear Cryptanalysis
                                                                                                                                                                  1. Side-Channel Attacks
                                                                                                                                                                    1. Timing Attacks
                                                                                                                                                                      1. Power Analysis Attacks
                                                                                                                                                                        1. Electromagnetic Attacks
                                                                                                                                                                      2. Brute Force Attacks
                                                                                                                                                                        1. Exhaustive Key Search
                                                                                                                                                                          1. Dictionary Attacks
                                                                                                                                                                            1. Rainbow Table Attacks
                                                                                                                                                                            2. Mathematical Attacks
                                                                                                                                                                              1. Factorization Attacks
                                                                                                                                                                                1. Discrete Logarithm Attacks
                                                                                                                                                                                  1. Lattice-Based Attacks