CompTIA Security+: Basic Cryptography & Public Key Infrastructure
CompTIA Security+
| Intermediate
- 13 Videos | 1h 13m 47s
- Includes Assessment
- Earns a Badge
To prepare for the CompTIA Security+ SY0-601 certification exam, you will need to be able to identify and describe basic cryptography concepts and their application in everyday use. You'll also need to recognize common aspects of Public Key Infrastructure (PKI). In this CompTIA Security+ SY0-601 course, you'll compare symmetric and asymmetric cryptography, recognize the characteristics of a cryptographic key, and contrast block and stream cipher operations. You'll explore the purpose and features of cryptographic hashing, common key exchange mechanisms, and various next-generation concepts such as lightweight cryptography, quantum and post-quantum computing, and homomorphic encryption. You'll move on to identify the main aspects and core concepts associated with Public Key Infrastructure (PKI). Finally, you'll distinguish several types of certificates and review different certificate formats.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursecontrast symmetric and asymmetric cryptosystemsdescribe a cryptographic key including key length, strength, stretching, and perfect forward secrecycompare block cipher and stream cipher operationsrelate the functions and features of cryptographic hashing including hashed message authentication codes (HMAC)distinguish common key exchange mechanisms such as Diffie-Hellman and Diffie-Hellman ephemeralsurvey modes of operation including authenticated (AEAD), unauthenticated, and counter
-
interpret advanced concepts such as quantum and post-quantum computing, blockchain, and homomorphic encryptionrecognize everyday use cases like confidentiality, integrity, obfuscation, authentication, and non-repudiationdefine several aspects of PKI including key management, certificate authority (CA), certificate revocation list (CRL), certificate attributes, the Online Certificate Status Protocol (OCSP) and certificate signing requests (CSR)classify different types of certificates such as wildcard, SAN, code signing, self-signed, machine/computer, email, user, root, domain validation, and extended validation, then survey certificate formats like Distinguished Encoding Rules (DER), Privacy-enhanced Mail (PEM), Personal Information Exchange (PFX), .cer, P12, and P7Bidentify core PKI concepts such as online, offline, stapling, pinning, key escrow, and certificate chainingsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 32sUP NEXT
-
2.Symmetric vs. Asymmetric Cryptosystems7m 28s
-
3.Characteristics of Cryptographic Keys5m 46s
-
4.Block vs. Stream Cipher Suites6m 54s
-
5.Cryptographic Hashing6m 22s
-
6.Key Exchange Mechanisms5m 37s
-
7.Modes of Operation3m 20s
-
8.Advanced Cryptography Concepts7m 12s
-
9.Common Use Cases and Limitations4m 16s
-
10.Public Key Infrastructure (PKI)7m 16s
-
11.Types of Certificates9m 27s
-
12.Core PKI Concepts7m 49s
-
13.Course Overview49s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.