CompTIA Cybersecurity Analyst+: Cryptography

Cybersecurity    |    Intermediate
  • 12 videos | 1h 5m 53s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Confidentiality, integrity, and availability are core pillars of IT security governance. Cybersecurity analysts can harden IT environments using various encryption and hashing techniques. In this course, examine how the CIA triad relates to IT security and how cryptography protects sensitive data. Next, discover how to configure EFS file encryption and Microsoft BitLocker encryption, and use a customer-managed key to enable encryption for an Azure storage account. Finally, learn how to hash files in Linux and Windows, about hardware security modules (HSMs), and how TLS supersedes SSL. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify how the cia triad enhances it security
    Outline how cryptography protects data
    Manage efs file encryption
    Configure microsoft bitlocker to protect data at rest
    Configure a microsoft azure storage account with a customer-managed key
  • Recognize how cryptography applies to data integrity
    Hash files in linux
    Manage file hashing in windows
    State how hsms are used for encryption offloading and the storage of cryptographic secrets
    Identify how tls supersedes ssl for network security
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 9s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 47s
    After completing this video, you will be able to identify how the CIA triad enhances IT security. FREE ACCESS
  • Locked
    3.  Cryptography
    6m 38s
    Upon completion of this video, you will be able to outline how cryptography protects data. FREE ACCESS
  • Locked
    4.  Managing Windows Encrypting File System
    6m 11s
    During this video, discover how to manage EFS file encryption. FREE ACCESS
  • Locked
    5.  Configuring Microsoft BitLocker
    5m 59s
    In this video, you will learn how to configure Microsoft BitLocker to protect data at rest. FREE ACCESS
  • Locked
    6.  Encrypting Cloud Storage
    8m 9s
    Find out how to configure a Microsoft Azure storage account with a customer-managed key. FREE ACCESS
  • Locked
    7.  Integrity
    4m 58s
    In this video, you will recognize how cryptography applies to data integrity. FREE ACCESS
  • Locked
    8.  Hashing Files in Linux
    5m 56s
    During this video, you will learn how to hash files in Linux. FREE ACCESS
  • Locked
    9.  Managing File Hashing in Windows
    5m 46s
    Discover how to manage file hashing in Windows. FREE ACCESS
  • Locked
    10.  Hardware Security Module (HSM)
    6m 26s
    After completing this video, you will be able to state how HSMs are used for encryption offloading and the storage of cryptographic secrets. FREE ACCESS
  • Locked
    11.  SSL and TLS
    6m 58s
    Upon completion of this video, you will be able to identify how TLS supersedes SSL for network security. FREE ACCESS
  • Locked
    12.  Course Summary
    55s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)