CISM 2020: Cryptography & PKI

CISM    |    Intermediate
  • 14 videos | 1h 16m
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 60 users Rating 4.6 of 60 users (60)
Securing data at rest and in transit over a network is accomplished through the use of cryptography. In this course, you'll explore the concepts of hashing and encryption. You'll start by studying how cryptography addresses IT security before gaining hands-on experience generating file hashes and encrypting data at rest. Some of the methods you'll practice will be using Microsoft EFS and AxCrypt to protect files, Microsoft BitLocker to protect disk volumes, PuTTYgen to generate key pairs, and wiping disk data. Moving along, you'll examine and work with PKI certificate authorities, deploying and requesting both Microsoft and AWS certificate authorities. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how cryptography addresses it security
    Generate a hash of a file
    Encrypt files using microsoft efs
    Encrypt files using third-party utilities
    Wipe data from disks securely to prevent data retrieval
    Encrypt a disk volume using microsoft bitlocker
  • Use puttygen to generate an rsa key pair
    Describe the pki hierarchy
    Deploy a microsoft certificate authority
    Request a certificate from a microsoft certificate authority
    Deploy a cloud-based certificate authority
    Request a certificate from a cloud-based certificate authority
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 47s
  • 7m 43s
    In this video, you will outline how cryptography can help improve IT security. FREE ACCESS
  • Locked
    3.  Generating File System Hashes
    6m 38s
    Learn how to generate a hash of a file. FREE ACCESS
  • Locked
    4.  Protecting Files Using Microsoft EFS
    6m 6s
    In this video, find out how to encrypt files using Microsoft's EFS. FREE ACCESS
  • Locked
    5.  Protecting Files Using AxCrypt
    6m 10s
    In this video, you will learn how to encrypt files using third-party utilities. FREE ACCESS
  • Locked
    6.  Wiping Data from Disks
    4m 57s
    During this video, you will learn how to wipe data from disks securely to prevent data retrieval. FREE ACCESS
  • Locked
    7.  Protecting Disk Volumes Using Microsoft BitLocker
    6m 12s
    In this video, you will encrypt a disk volume using Microsoft BitLocker. FREE ACCESS
  • Locked
    8.  Generating Key Pairs Using PuTTYgen
    7m 3s
    Learn how to use PuTTYgen to generate an RSA key pair. FREE ACCESS
  • Locked
    9.  Public Key Infrastructure
    5m 36s
    Upon completion of this video, you will be able to describe the hierarchy of PKI. FREE ACCESS
  • Locked
    10.  Deploying a Microsoft ADCS Certificate Authority
    6m 43s
    In this video, learn how to deploy a Microsoft certificate authority. FREE ACCESS
  • Locked
    11.  Requesting a Microsoft ADCS Certificate
    6m 34s
    In this video, you will learn how to request a certificate from a Microsoft certificate authority. FREE ACCESS
  • Locked
    12.  Deploying an AWS Private Certificate Authority
    5m 18s
    Find out how to deploy a cloud-based certificate authority. FREE ACCESS
  • Locked
    13.  Requesting an AWS Certificate
    4m 1s
    In this video, find out how to request a certificate from a cloud-based certificate authority. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 12s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.6 of 164 users Rating 4.6 of 164 users (164)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 37 users Rating 4.5 of 37 users (37)
Rating 4.5 of 42 users Rating 4.5 of 42 users (42)
Rating 4.6 of 85 users Rating 4.6 of 85 users (85)