CompTIA CASP+: Cryptography & PKI

CompTIA    |    Intermediate
  • 17 videos | 1h 51m 27s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 42 users Rating 4.5 of 42 users (42)
Cryptography has long played a role in securing sensitive information. In this course, you'll begin with an overview of cryptography and how it can secure data at rest and data in motion. You'll then learn how to enable EFS and BitLocker to protect data at rest. You'll explore how to identify methods by which cryptography can protect data in transit and configure network security via IPsec. Finally, you'll examine how PKI uses certificates to secure IT systems through HTTPS, SSH remote management, and generating file system hashes. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how cryptography addresses security concerns
    Differentiate between symmetric and asymmetric encryption
    Recognize the purpose of hashing and digital signatures
    Recognize how to protect data at rest with cryptography
    Enable efs to protect data at rest
    Enable bitlocker to protect data at rest
    Identify methods by which cryptography can protect data in transit
    Configure network security via ipsec
  • Recognize the role that pki plays in security
    Identify how pki certificates are used in security
    Create a private certificate authority
    Configure custom pki certificate templates
    Issue pki certificates for users and devices
    Generate a certificate in an azure cloud-based key vault
    Use common operating system commands to generate file system hashes
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 34s
    This course reviews cryptography: how to secure data at rest and in motion; how to enable EFS and BitLocker for data at rest; how cryptography protects data in transit; how to configure network security via Ipsec; how to acquire PKI certificates; and how to generate file system hashes. FREE ACCESS
  • 8m 19s
    Explore how cryptography addresses security concerns through technology such as S/MIME, HTTPS, Secure Shell (SSH), VPN, encryption keys, Trusted Platform Module (TPM), hardware security module (HSM), and Password Based Key Derivation Function version 2 (PBKDF2). FREE ACCESS
  • Locked
    3.  Symmetric and Asymmetric Encryption
    6m 19s
    Explore and compare symmetric and asymmetric encryption. Discover encryption key types and strategies, such as public keys, private keys, secret keys, the Diffie Hellman key exchange protocol, ciphers, the Digital Encryption Standard, 3DES, the Advanced Encryption standard (AES), RSA, and ECC. FREE ACCESS
  • Locked
    4.  Hashing and Digital Signatures
    9m 3s
    Explore hashing algorithms and digital signature systems. Learn what a rainbow table is and how it is used. Discover Bcrypt, ECDSA, SHA256, Hash-based Message Authentication Code (HMAC), Poly 1305, and the notion of non-repudiation. FREE ACCESS
  • Locked
    5.  Cryptography and Storage
    6m 34s
    Discover strategies to protect data at rest through cryptography. Explore cryptographic technology examples, such as the Self-Encrypting Drive (SED), the Windows Encrypting File System (EFS), Microsoft BitLocker, and TPM chips. FREE ACCESS
  • Locked
    6.  Protecting Files with Encrypting File System
    6m 53s
    See how the Windows Encrypting File System (EFS) protects files. Learn how to configure the Advanced Attributes dialog box, add users, execute cipher commands, and use Microsoft Management Console to view certificates. FREE ACCESS
  • Locked
    7.  Protecting Disk Volumes with BitLocker
    5m 34s
    Explore how to protect disk volumes with Windows BitLocker. Protect data at rest at the disk level. See how to install BitLocker drive encryption on your system, execute BitLocker commands from the command prompt, and generate recovery keys. FREE ACCESS
  • Locked
    8.  Cryptography and Network Communications
    7m 9s
    See how cryptography can protect data in transit, over local area networks, through the Internet, on mobile devices, on social media, and in bank systems. Learn about IPsec, VPNs, TLS,  SSL, FTPS, and HTTPS. FREE ACCESS
  • Locked
    9.  Enabling IPsec to Secure IP Traffic
    8m 9s
    Learn how to configure network security via IPsec, apply the Active Directory authentication protocol, manage group policies, manually force a group policy update from the command prompt, and capture IPsec traffic. FREE ACCESS
  • Locked
    10.  The PKI Hierarchy
    6m 39s
    Identify the role that Public Key Infrastructure (PKI) plays in security. Learn about the roles of a Certification Authority (CA), digital security certificates, and the chain of trust. Distinguish the characteristics and uses of public and private CAs. Explore the PKI hierarchy. FREE ACCESS
  • Locked
    11.  PKI Certificates
    10m 43s
    Identify how PKI certificates support security. Explore the PKI certificate lifecycle. Discover how a certification authority performs due diligence to verify certificate holders. Learn about certificate pinning and certificate revocation. FREE ACCESS
  • Locked
    12.  Deploying a Private Certificate Authority
    8m 12s
    Watch how to create a private Certificate Authority. Follow steps through the Windows Server Manager application wizard. Continue the setup through the private certificate authority menus on the Amazon Web Services (AWS) Certificate Manager. FREE ACCESS
  • Locked
    13.  Configuring Custom Certificate Templates
    6m 11s
    In this video, you will see how to configure custom Public Key Infrastructure (PKI) certificate templates. Work with the Server Manager GUI tool and the Certificate Templates Console to setup a custom web server template. FREE ACCESS
  • Locked
    14.  Issuing PKI Certificates
    6m 13s
    Explore how to issue PKI certificates for users and devices. Work with snap-ins to manage certificates. Establish permissions for Authenticated Users. Use the AWS Management Console's Certificate Manager to setup a private certificate. FREE ACCESS
  • Locked
    15.  Generating Certificates in the Cloud
    7m 19s
    Generate a certificate in an Azure cloud-based key vault. For this example, we will create our own self-certified PKI certificate. See how to add certificate authorities from the Provider dropdown list, such as DigiCert or GlobalSign. FREE ACCESS
  • Locked
    16.  Generating File Hashes
    5m 24s
    Watch how to use common operating system commands to generate file system hashes. Manually generate file system hashes in Windows and in Linux. Learn about file integrity monitoring (FIM) tools at the enterprise level that you can configure to automatically alert you to file changes. FREE ACCESS
  • Locked
    17.  Course Summary
    1m 13s
    In this course, we reviewed cryptography: how to secure data at rest and in motion; how to enable EFS and BitLocker for data at rest; how cryptography protects data in transit; how to configure network security via Ipsec; how to acquire PKI certificates; and how to generate file system hashes. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 164 users Rating 4.6 of 164 users (164)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 71 users Rating 4.6 of 71 users (71)
Rating 4.5 of 116 users Rating 4.5 of 116 users (116)
Rating 4.5 of 87 users Rating 4.5 of 87 users (87)