Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection

CISA    |    Expert
  • 16 videos | 1h 1m 5s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)
Explore how public key infrastructure (PKI) provides a hierarchy of digital security certificates used to secure data and authenticate users and devices and how data are protected with encryption and file integrity verification, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 16-video course include: how cryptography protects data; distinguishing between asymmetric and symmetric encryption; steps in the PKI certificate lifecycle; and how to deploy a private Microsoft CA (certificate authority). Next, learn about configuring customized PKI certificate templates; how Transport Layer Security (TLS) and Internet Protocol Security (IPsec) secure network communications; disabling SSLv3 (secure sockets layer) on clients and servers; and configuring an Internet Information Services (IIS) website with a PKI certificate. Then learn about client PKI certificates for website access; how to protect data at rest with Windows Encrypting File System (EFS); and how to protect data at rest with Windows BitLocker. Finally, learn to use SHA-256 (secure hash algorithm) hashing to verify file integrity; and work with PKI certificates to secure data in transit and at rest.

WHAT YOU WILL LEARN

  • Define how cryptography protects data
    Distinguish between asymmetric and symmetric encryption
    List elements in the pki hierarchy
    Identify the steps in the pki certificate life cycle
    Deploy a private microsoft ca
    Configure customized pki certificate templates
    Request a pki certificate manually
    Recognize how tls and ipsec can secure network communications
  • Disable sslv3 on clients and servers
    Configure an iis web site with a pki certificate
    Require client pki certificates for web site access
    Protect data at rest using windows encrypting file system
    Protect data at rest using windows bitlocker
    Use sha-256 hashing to verify file integrity
    Work with pki certificates to secure data in transit and at rest

IN THIS COURSE

  • 2m 22s
  • 5m 32s
    In this video, you will learn how cryptography protects data. FREE ACCESS
  • Locked
    3.  Asymmetric and Symmetric Encryption
    4m 32s
    During this video, you will learn how to distinguish between asymmetric and symmetric encryption. FREE ACCESS
  • Locked
    4.  PKI Hierarchy
    6m 3s
    After completing this video, you will be able to list the elements in the PKI hierarchy. FREE ACCESS
  • Locked
    5.  The PKI Certificate Life Cycle
    4m 12s
    In this video, you will identify the steps in the PKI certificate life cycle. FREE ACCESS
  • Locked
    6.  Private Certificate Authority
    3m 13s
    In this video, you will deploy a Microsoft CA in a private network. FREE ACCESS
  • Locked
    7.  Certificate Templates
    3m 14s
    In this video, you will learn how to configure customized PKI certificate templates. FREE ACCESS
  • Locked
    8.  Manual Certificate Issuance
    2m 36s
    In this video, you will learn how to request a PKI certificate manually. FREE ACCESS
  • Locked
    9.  Securing Network Traffic
    4m 23s
    After completing this video, you will be able to recognize how TLS and IPsec can secure network communications. FREE ACCESS
  • Locked
    10.  Disable SSLv3
    2m 20s
    In this video, you will learn how to disable SSLv3 on clients and servers. FREE ACCESS
  • Locked
    11.  Enable an HTTPS Web Site
    3m 48s
    In this video, you will learn how to configure an IIS web site with a PKI certificate. FREE ACCESS
  • Locked
    12.  Client SSL/TLS Certificates
    5m 27s
    In this video, find out how to require client PKI certificates for web site access. FREE ACCESS
  • Locked
    13.  Windows Encrypting File System
    2m 47s
    In this video, find out how to protect data at rest using the Windows Encrypting File System. FREE ACCESS
  • Locked
    14.  Windows BitLocker
    4m 45s
    During this video, you will learn how to protect data at rest using Windows BitLocker. FREE ACCESS
  • Locked
    15.  File Integrity
    2m 46s
    During this video, you will learn how to use SHA-256 hashing to verify the integrity of files. FREE ACCESS
  • Locked
    16.  Exercise: Applying PKI Security
    3m 4s
    In this video, you will learn how to work with PKI certificates to secure data in transit and at rest. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
Rating 4.5 of 42 users Rating 4.5 of 42 users (42)
Rating 4.9 of 14 users Rating 4.9 of 14 users (14)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 53 users Rating 4.7 of 53 users (53)
Rating 4.6 of 1774 users Rating 4.6 of 1774 users (1774)
Rating 4.4 of 96 users Rating 4.4 of 96 users (96)