Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
CISA 2019
| Expert
- 16 Videos | 1h 1m 5s
- Includes Assessment
- Earns a Badge
Explore how public key infrastructure (PKI) provides a hierarchy of digital security certificates used to secure data and authenticate users and devices and how data are protected with encryption and file integrity verification, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 16-video course include: how cryptography protects data; distinguishing between asymmetric and symmetric encryption; steps in the PKI certificate lifecycle; and how to deploy a private Microsoft CA (certificate authority). Next, learn about configuring customized PKI certificate templates; how Transport Layer Security (TLS) and Internet Protocol Security (IPsec) secure network communications; disabling SSLv3 (secure sockets layer) on clients and servers; and configuring an Internet Information Services (IIS) website with a PKI certificate. Then learn about client PKI certificates for website access; how to protect data at rest with Windows Encrypting File System (EFS); and how to protect data at rest with Windows BitLocker. Finally, learn to use SHA-256 (secure hash algorithm) hashing to verify file integrity; and work with PKI certificates to secure data in transit and at rest.
WHAT YOU WILL LEARN
-
define how cryptography protects datadistinguish between asymmetric and symmetric encryptionlist elements in the PKI hierarchyidentify the steps in the PKI certificate life cycledeploy a private Microsoft CAconfigure customized PKI certificate templatesrequest a PKI certificate manuallyrecognize how TLS and IPsec can secure network communications
-
disable SSLv3 on clients and serversconfigure an IIS web site with a PKI certificaterequire client PKI certificates for web site accessprotect data at rest using Windows Encrypting File Systemprotect data at rest using Windows BitLockeruse SHA-256 hashing to verify file integritywork with PKI certificates to secure data in transit and at rest
IN THIS COURSE
-
1.Course Overview2m 22sUP NEXT
-
2.Cryptography5m 32s
-
3.Asymmetric and Symmetric Encryption4m 32s
-
4.PKI Hierarchy6m 3s
-
5.The PKI Certificate Life Cycle4m 12s
-
6.Private Certificate Authority3m 13s
-
7.Certificate Templates3m 14s
-
8.Manual Certificate Issuance2m 36s
-
9.Securing Network Traffic4m 23s
-
10.Disable SSLv32m 20s
-
11.Enable an HTTPS Web Site3m 48s
-
12.Client SSL/TLS Certificates5m 27s
-
13.Windows Encrypting File System2m 47s
-
14.Windows BitLocker4m 45s
-
15.File Integrity2m 46s
-
16.Exercise: Applying PKI Security3m 4s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.