CISA 2022: Protecting Information Assets

CISA    |    Expert
  • 16 videos | 1h 24m 6s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Information is a primary asset of most organizations today. It has a real value and, if compromised, could have real implications for the enterprise. In this course, you will explore considerations for protecting information assets, beginning with cryptography, asymmetric and symmetric encryption, Windows Encrypting File System, and Windows BitLocker. Then, you will learn about file integrity, the public key infrastructure (PKI) hierarchy, the PKI certificate life cycle, and private certificate authorities (CAs). Finally, you will discover certificate templates, manual certificate issuance, securing network traffic, disabling SSLv3, enabling an HTTPS website, and client Secure Sockets Layer (SSL)/Transport Layer Security (TLS) certificates. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how cryptography can be used to protect data
    Distinguish between asymmetric and symmetric encryption
    Protect data at rest using windows encrypting file system
    Protect data at rest using windows bitlocker
    use sha-256 hashing to verify file integrity
    Identify elements in the public key infrastructure (pki) hierarchy
    List the steps in the pki certificate life cycle
  • Deploy a private microsoft certificate authority (ca)
    Configure customized pki certificate templates
    Request a pki certificate manually
    Outline how transport layer security (tls) and internet protocol security (ipsec) can secure network communications
    Disable secure socket layer version 3 (sslv3) on clients and servers
    Configure an internet information services (iis) web site with a pki certificate
    require client pki certificates for web site access
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 7s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 45s
    After completing this video, you will be able to outline how cryptography can be used to protect data. FREE ACCESS
  • Locked
    3.  Asymmetric and Symmetric Encryption
    5m 37s
    Upon completion of this video, you will be able to distinguish between asymmetric and symmetric encryption. FREE ACCESS
  • Locked
    4.  Protecting Data at Rest Using Windows Encrypting File System
    5m 49s
    In this video, find out how to protect data at rest using Windows Encrypting File System. FREE ACCESS
  • Locked
    5.  Protecting Data at Rest Using Windows BitLocker
    4m 50s
    Learn how to protect data at rest using Windows BitLocker. FREE ACCESS
  • Locked
    6.  Verifying File Integrity
    6m
    During this video, discover how to use SHA-256 hashing to verify file integrity. FREE ACCESS
  • Locked
    7.  Public Key Infrastructure (PKI) Hierarchy
    6m 40s
    After completing this video, you will be able to identify elements in the public key infrastructure (PKI) hierarchy. FREE ACCESS
  • Locked
    8.  The PKI Certificate Life Cycle
    4m 28s
    Upon completion of this video, you will be able to list the steps in the PKI certificate life cycle. FREE ACCESS
  • Locked
    9.  Deploying a Private Certificate Authority (CA)
    7m 42s
    In this video, you will learn how to deploy a private Microsoft Certificate Authority (CA). FREE ACCESS
  • Locked
    10.  Configuring Certificate Templates
    6m 11s
    Discover how to configure customized PKI certificate templates. FREE ACCESS
  • Locked
    11.  Issuing Manual Certificates
    5m 10s
    Find out how to request a PKI certificate manually. FREE ACCESS
  • Locked
    12.  Secure Network Traffic
    5m 40s
    After completing this video, you will be able to outline how Transport Layer Security (TLS) and Internet Protocol Security (IPsec) can secure network communications. FREE ACCESS
  • Locked
    13.  Disabling Secure Socket Layer Version 3 (SSLv3)
    6m 3s
    In this video, find out how to disable Secure Socket Layer version 3 (SSLv3) on clients and servers. FREE ACCESS
  • Locked
    14.  Enabling an HTTPS Website
    5m 31s
    During this video, discover how to configure an Internet Information Services (IIS) web site with a PKI certificate. FREE ACCESS
  • Locked
    15.  Requiring Client SSL/TLS Certificates
    5m 32s
    In this video, you will learn how to require client PKI certificates for web site access. FREE ACCESS
  • Locked
    16.  Course Summary
    1m 1s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.0 of 1 users Rating 4.0 of 1 users (1)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)