Authentication & Encryption: Best Practices

Intermediate
  • 14 Videos | 1h 2m 16s
  • Includes Assessment
  • Earns a Badge
Likes 8 Likes 8
In this 14-video course, explore the authentication, authorization, and encryption options that a security architect will need on a day-to-day basis. The focus will be on two fronts—from a network security standpoint including cloud services, and internal solutions in an Agile and DevOps environment. Begin with a look at authentication, authorization, and encryption factors and how they fit together, then look at methods of authentication and best practices. This leads into methods of authorization and access control; the use of encryption methods and best practices in implementing encryption; and key symmetry—differentiating between public and private keys and their ciphers. Examine methods of keeping login and authentication credentials secure; view system authentication and authorization through user account administration in Linux, and handle security policy trade-offs in situations where solutions might not align with policy. Discover Secure Shell (SSH) configuration, and implementing and securing remote access to a system using SSH; create secure certificates and keys using OpenSSL; verify software package authenticity by using OpenSSL, and file encryption and file decryption with OpenSSL.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe authentication, authorization, and encryption factors and how they fit together
    describe methods of authentication and their best practices
    describe methods of authorization and access control
    describe the use of encryption methods and best practices in implementing encryption
    differentiate between public and private keys and their ciphers
    describe methods of keeping login and authentication credentials secure
  • describe system authentication and authorization through user account administration in Linux
    handle security policy trade-offs in situations where solutions might not align with policy
    implement and secure remote access to a system using SSH
    create secure certificates and keys using OpenSSL
    verify software package integrity using OpenSSL
    encrypt and decrypt files with OpenSSL
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 26 Likes 26  
Likes 141 Likes 141