CISM 2020: Cryptography & PKI

CISM 2020    |    Intermediate
  • 14 Videos | 1h 22m
  • Includes Assessment
  • Earns a Badge
Likes 4 Likes 4
Securing data at rest and in transit over a network is accomplished through the use of cryptography. In this course, you'll explore the concepts of hashing and encryption. You'll start by studying how cryptography addresses IT security before gaining hands-on experience generating file hashes and encrypting data at rest. Some of the methods you'll practice will be using Microsoft EFS and AxCrypt to protect files, Microsoft BitLocker to protect disk volumes, PuTTYgen to generate key pairs, and wiping disk data. Moving along, you'll examine and work with PKI certificate authorities, deploying and requesting both Microsoft and AWS certificate authorities. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    outline how cryptography addresses IT security
    generate a hash of a file
    encrypt files using Microsoft EFS
    encrypt files using third-party utilities
    wipe data from disks securely to prevent data retrieval
    encrypt a disk volume using Microsoft BitLocker
  • use PuTTYgen to generate an RSA key pair
    describe the PKI hierarchy
    deploy a Microsoft certificate authority
    request a certificate from a Microsoft certificate authority
    deploy a cloud-based certificate authority
    request a certificate from a cloud-based certificate authority
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 47s
    UP NEXT
  • Playable
    2. 
    Cryptography and IT Security
    7m 43s
  • Locked
    3. 
    Generating File System Hashes
    6m 38s
  • Locked
    4. 
    Protecting Files Using Microsoft EFS
    6m 6s
  • Locked
    5. 
    Protecting Files Using AxCrypt
    6m 10s
  • Locked
    6. 
    Wiping Data from Disks
    4m 57s
  • Locked
    7. 
    Protecting Disk Volumes Using Microsoft BitLocker
    6m 12s
  • Locked
    8. 
    Generating Key Pairs Using PuTTYgen
    7m 3s
  • Locked
    9. 
    Public Key Infrastructure
    5m 36s
  • Locked
    10. 
    Deploying a Microsoft ADCS Certificate Authority
    6m 43s
  • Locked
    11. 
    Requesting a Microsoft ADCS Certificate
    6m 34s
  • Locked
    12. 
    Deploying an AWS Private Certificate Authority
    5m 18s
  • Locked
    13. 
    Requesting an AWS Certificate
    4m 1s
  • Locked
    14. 
    Course Summary
    1m 12s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE