Authentication & Encryption: Best Practices

Intermediate
  • 14 videos | 56m 16s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 129 users Rating 4.3 of 129 users (129)
In this 14-video course, explore the authentication, authorization, and encryption options that a security architect will need on a day-to-day basis. The focus will be on two fronts-from a network security standpoint including cloud services, and internal solutions in an Agile and DevOps environment. Begin with a look at authentication, authorization, and encryption factors and how they fit together, then look at methods of authentication and best practices. This leads into methods of authorization and access control; the use of encryption methods and best practices in implementing encryption; and key symmetry-differentiating between public and private keys and their ciphers. Examine methods of keeping login and authentication credentials secure; view system authentication and authorization through user account administration in Linux, and handle security policy trade-offs in situations where solutions might not align with policy. Discover Secure Shell (SSH) configuration, and implementing and securing remote access to a system using SSH; create secure certificates and keys using OpenSSL; verify software package authenticity by using OpenSSL, and file encryption and file decryption with OpenSSL.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe authentication, authorization, and encryption factors and how they fit together
    Describe methods of authentication and their best practices
    Describe methods of authorization and access control
    Describe the use of encryption methods and best practices in implementing encryption
    Differentiate between public and private keys and their ciphers
    Describe methods of keeping login and authentication credentials secure
  • Describe system authentication and authorization through user account administration in linux
    Handle security policy trade-offs in situations where solutions might not align with policy
    Implement and secure remote access to a system using ssh
    Create secure certificates and keys using openssl
    Verify software package integrity using openssl
    Encrypt and decrypt files with openssl
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 26s
  • 3m 23s
    After completing this video, you will be able to describe authentication, authorization, and encryption factors and how they work together. FREE ACCESS
  • Locked
    3.  Authentication Best Practices
    4m 51s
    Upon completion of this video, you will be able to describe methods of authentication and best practices. FREE ACCESS
  • Locked
    4.  Authorization Best Practices
    3m 57s
    After completing this video, you will be able to describe methods of authorization and access control. FREE ACCESS
  • Locked
    5.  Encryption Best Practices
    2m 52s
    After completing this video, you will be able to describe the use of encryption methods and best practices for implementing encryption. FREE ACCESS
  • Locked
    6.  Key Symmetry
    3m 7s
    During this video, you will learn how to differentiate between public and private keys and their algorithms. FREE ACCESS
  • Locked
    7.  Credential Security
    4m 31s
    After completing this video, you will be able to describe methods of keeping login and authentication credentials secure. FREE ACCESS
  • Locked
    8.  User Administration
    5m 44s
    After completing this video, you will be able to describe system authentication and authorization through user account administration in Linux. FREE ACCESS
  • Locked
    9.  Security Policy Trade-offs
    4m 15s
    In this video, learn how to handle security policy trade-offs in situations where solutions might not align with policy. FREE ACCESS
  • Locked
    10.  SSH Configuration
    7m 52s
    In this video, find out how to implement and secure remote access to a system using SSH. FREE ACCESS
  • Locked
    11.  Certificate Creation
    5m 35s
    In this video, you will learn how to create secure certificates and keys using OpenSSL. FREE ACCESS
  • Locked
    12.  Software Package Authenticity
    3m 39s
    In this video, you will verify the integrity of software packages using OpenSSL. FREE ACCESS
  • Locked
    13.  File Encryption and Decryption
    3m 48s
    In this video, you will learn how to encrypt and decrypt files with OpenSSL. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 15s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 164 users Rating 4.6 of 164 users (164)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 4247 users Rating 4.6 of 4247 users (4247)
Rating 4.5 of 237 users Rating 4.5 of 237 users (237)
Rating 4.4 of 77 users Rating 4.4 of 77 users (77)