CISM 2022: Applied Cryptography

CISM    |    Intermediate
  • 14 videos | 1h 16m 17s
  • Includes Assessment
  • Earns a Badge
Rating 4.9 of 7 users Rating 4.9 of 7 users (7)
The periodic evaluation of the efficacy of cryptographic solutions is possible only with an understanding of how cryptography secures digital environments. In this course, you will explore data integrity by hashing files on the Linux and Windows platforms in an effort to detect unauthorized changes. You will configure a web application HTTPS binding to secure network communications to and from the web application. Then you will deploy a private certificate authority (CA), manage certificate templates, and deploy public key infrastructure (PKI) certificates. Next, you will configure a web application to require trusted client certificates. Finally, you will encrypt data at rest on Linux, on Windows with Encrypting File System (EFS), and Microsoft Bitlocker, and you will configure a cloud VPN connection and implement IPsec on Windows. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Generate linux file system hashes
    Generate windows file system hashes
    Configure an https binding for a web application
    Create a windows-based private ca
    Manage windows public key infrastructure certificate templates
    Acquire a pki certificate
  • Configure a web app to require client pki certificates
    Configure efs file encryption
    Configure microsoft bitlocker to protect data at rest
    Configure linux file system encryption to protect data at rest
    Configure a user vpn to the azure cloud
    Configure ipsec in a windows environment
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 17s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 32s
    During this video, you will learn how to generate Linux file system hashes. FREE ACCESS
  • Locked
    3.  Generating File System Hashes Using PowerShell
    6m 25s
    In this video, find out how to generate Windows file system hashes. FREE ACCESS
  • Locked
    4.  Enabling an HTTPS Binding
    6m
    During this video, discover how to configure an HTTPS binding for a web application. FREE ACCESS
  • Locked
    5.  Deploying a Private Certificate Authority (CA)
    5m 59s
    Learn how to create a Windows-based private CA. FREE ACCESS
  • Locked
    6.  Managing PKI Certificate Templates
    5m 48s
    Find out how to manage Windows public key infrastructure certificate templates. FREE ACCESS
  • Locked
    7.  Acquiring PKI Certificates
    6m 6s
    In this video, you will learn how to acquire a PKI certificate. FREE ACCESS
  • Locked
    8.  Client PKI Certificates
    6m 14s
    Discover how to configure a web app to require client PKI certificates. FREE ACCESS
  • Locked
    9.  Managing Windows Encrypting File System (EFS)
    4m 58s
    During this video, you will learn how to configure EFS file encryption. FREE ACCESS
  • Locked
    10.  Managing Microsoft BitLocker
    7m 11s
    In this video, you will learn how to configure Microsoft BitLocker to protect data at rest. FREE ACCESS
  • Locked
    11.  Managing Linux File System Encryption
    5m 9s
    In this video, discover how to configure Linux file system encryption to protect data at rest. FREE ACCESS
  • Locked
    12.  Configuring a Cloud-based User VPN
    6m 4s
    Find out how to configure a user VPN to the Azure cloud. FREE ACCESS
  • Locked
    13.  Implementing IPsec with Windows
    6m 31s
    Learn how to configure IPsec in a Windows environment. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 2s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.9 of 8 users Rating 4.9 of 8 users (8)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.7 of 9 users Rating 4.7 of 9 users (9)