Course Details

Previous Page


Systems Security Certified Practitioner: Cryptography


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Enterprise assets, including data, must be protected at all times, including when stored, accessed, shared, and transmitted. This course provides an overview of cryptography best practices, including hashing, salting, encryption, and digital signature usage. It also covers cryptography regulatory requirements and best practices for implementing and operating cryptographic systems, including PKI and Web of Trust. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.

Target Audience
Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices

Prerequisites
None

Expected Duration (hours)
1.1

Lesson Objectives

Systems Security Certified Practitioner: Cryptography

  • start the course
  • describe purpose and best practices for applying hashing
  • describe purpose and best practices for applying salting
  • distinguish between symmetric and asymmetric encryption application
  • describe characteristics and best practices for applying digital signatures
  • describe characteristics and best practices for applying non-repudiation
  • describe the purpose and role of data sensitivity in cryptography
  • identify regulatory requirements for cryptography
  • identify end-user training best practices related to cryptography
  • compare differences in implementation methodologies
  • describe best practices for appropriate use of security protocols
  • identify fundamental key management concepts of cryptographic systems
  • describe how to use PKI as part of implementing and operating cryptographic systems
  • describe administration and validation activities as part of operating and implementing cryptographic systems
  • describe characteristics of Web of Trust
  • identify best practices for implementing secure protocols
  • identify best practices for implementing and operating cryptographic systems and controls
  • Course Number:
    sp_sscp_a06_it_enus