CompTIA Security+: Basic Cryptography & Public Key Infrastructure

CompTIA Security+    |    Intermediate
  • 13 Videos | 1h 19m 17s
  • Includes Assessment
  • Earns a Badge
Likes 38 Likes 38
To prepare for the CompTIA Security+ SY0-601 certification exam, you will need to be able to identify and describe basic cryptography concepts and their application in everyday use. You'll also need to recognize common aspects of Public Key Infrastructure (PKI). In this CompTIA Security+ SY0-601 course, you'll compare symmetric and asymmetric cryptography, recognize the characteristics of a cryptographic key, and contrast block and stream cipher operations. You'll explore the purpose and features of cryptographic hashing, common key exchange mechanisms, and various next-generation concepts such as lightweight cryptography, quantum and post-quantum computing, and homomorphic encryption. You'll move on to identify the main aspects and core concepts associated with Public Key Infrastructure (PKI). Finally, you'll distinguish several types of certificates and review different certificate formats.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    contrast symmetric and asymmetric cryptosystems
    describe a cryptographic key including key length, strength, stretching, and perfect forward secrecy
    compare block cipher and stream cipher operations
    relate the functions and features of cryptographic hashing including hashed message authentication codes (HMAC)
    distinguish common key exchange mechanisms such as Diffie-Hellman and Diffie-Hellman ephemeral
    survey modes of operation including authenticated (AEAD), unauthenticated, and counter
  • interpret advanced concepts such as quantum and post-quantum computing, blockchain, and homomorphic encryption
    recognize everyday use cases like confidentiality, integrity, obfuscation, authentication, and non-repudiation
    define several aspects of PKI including key management, certificate authority (CA), certificate revocation list (CRL), certificate attributes, the Online Certificate Status Protocol (OCSP) and certificate signing requests (CSR)
    classify different types of certificates such as wildcard, SAN, code signing, self-signed, machine/computer, email, user, root, domain validation, and extended validation, then survey certificate formats like Distinguished Encoding Rules (DER), Privacy-enhanced Mail (PEM), Personal Information Exchange (PFX), .cer, P12, and P7B
    identify core PKI concepts such as online, offline, stapling, pinning, key escrow, and certificate chaining
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 32s
    UP NEXT
  • Playable
    2. 
    Symmetric vs. Asymmetric Cryptosystems
    7m 28s
  • Locked
    3. 
    Characteristics of Cryptographic Keys
    5m 46s
  • Locked
    4. 
    Block vs. Stream Cipher Suites
    6m 54s
  • Locked
    5. 
    Cryptographic Hashing
    6m 22s
  • Locked
    6. 
    Key Exchange Mechanisms
    5m 37s
  • Locked
    7. 
    Modes of Operation
    3m 20s
  • Locked
    8. 
    Advanced Cryptography Concepts
    7m 12s
  • Locked
    9. 
    Common Use Cases and Limitations
    4m 16s
  • Locked
    10. 
    Public Key Infrastructure (PKI)
    7m 16s
  • Locked
    11. 
    Types of Certificates
    9m 27s
  • Locked
    12. 
    Core PKI Concepts
    7m 49s
  • Locked
    13. 
    Course Overview
    49s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE