CompTIA Security+: Basic Cryptography & Public Key Infrastructure

CompTIA    |    Intermediate
  • 13 videos | 1h 13m 47s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 180 users Rating 4.2 of 180 users (180)
To prepare for the CompTIA Security+ SY0-601 certification exam, you will need to be able to identify and describe basic cryptography concepts and their application in everyday use. You'll also need to recognize common aspects of Public Key Infrastructure (PKI). In this CompTIA Security+ SY0-601 course, you'll compare symmetric and asymmetric cryptography, recognize the characteristics of a cryptographic key, and contrast block and stream cipher operations. You'll explore the purpose and features of cryptographic hashing, common key exchange mechanisms, and various next-generation concepts such as lightweight cryptography, quantum and post-quantum computing, and homomorphic encryption. You'll move on to identify the main aspects and core concepts associated with Public Key Infrastructure (PKI). Finally, you'll distinguish several types of certificates and review different certificate formats.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Contrast symmetric and asymmetric cryptosystems
    Describe a cryptographic key including key length, strength, stretching, and perfect forward secrecy
    Compare block cipher and stream cipher operations
    Relate the functions and features of cryptographic hashing including hashed message authentication codes (hmac)
    Distinguish common key exchange mechanisms such as diffie-hellman and diffie-hellman ephemeral
    Survey modes of operation including authenticated (aead), unauthenticated, and counter
  • Interpret advanced concepts such as quantum and post-quantum computing, blockchain, and homomorphic encryption
    Recognize everyday use cases like confidentiality, integrity, obfuscation, authentication, and non-repudiation
    Define several aspects of pki including key management, certificate authority (ca), certificate revocation list (crl), certificate attributes, the online certificate status protocol (ocsp) and certificate signing requests (csr)
    Classify different types of certificates such as wildcard, san, code signing, self-signed, machine/computer, email, user, root, domain validation, and extended validation, then survey certificate formats like distinguished encoding rules (der), privacy-enhanced mail (pem), personal information exchange (pfx), .cer, p12, and p7b
    Identify core pki concepts such as online, offline, stapling, pinning, key escrow, and certificate chaining
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 32s
  • 7m 28s
    In this video, find out how to compare symmetric and asymmetric cryptosystems. FREE ACCESS
  • Locked
    3.  Characteristics of Cryptographic Keys
    5m 46s
    Upon completion of this video, you will be able to describe a cryptographic key, including key length, strength, stretching, and perfect forward secrecy. FREE ACCESS
  • Locked
    4.  Block vs. Stream Cipher Suites
    6m 54s
    To compare block cipher and stream cipher operations, find out how. FREE ACCESS
  • Locked
    5.  Cryptographic Hashing
    6m 22s
    In this video, find out how cryptographic hashing works, including hashed message authentication codes (HMAC). FREE ACCESS
  • Locked
    6.  Key Exchange Mechanisms
    5m 37s
    In this video, find out how to distinguish between common key exchange mechanisms such as Diffie-Hellman and Diffie-Hellman ephemeral. FREE ACCESS
  • Locked
    7.  Modes of Operation
    3m 20s
    In this video, you will survey modes of operation including authenticated (AEAD), unauthenticated, and counter. FREE ACCESS
  • Locked
    8.  Advanced Cryptography Concepts
    7m 12s
    In this video, you will interpret advanced concepts such as quantum computing, blockchain, and homomorphic encryption. FREE ACCESS
  • Locked
    9.  Common Use Cases and Limitations
    4m 16s
    After completing this video, you will be able to recognize everyday use cases such as confidentiality, integrity, obfuscation, authentication, and non-repudiation. FREE ACCESS
  • Locked
    10.  Public Key Infrastructure (PKI)
    7m 16s
    Find out how to define several aspects of PKI including key management, certificate authority (CA), certificate revocation list (CRL), certificate attributes, the Online Certificate Status Protocol (OCSP), and certificate signing requests (CSR). FREE ACCESS
  • Locked
    11.  Types of Certificates
    9m 27s
    In this video, you will learn how to classify different types of certificates, such as wildcard, SAN, code signing, self-signed, machine/computer, email, user, root, domain validation, and extended validation. You will also survey different certificate formats, like Distinguished Encoding Rules (DER), Privacy-enhanced Mail (PEM), Personal Information Exchange (PFX), .cer, P12, and P7B. FREE ACCESS
  • Locked
    12.  Core PKI Concepts
    7m 49s
    In this video, you will learn how to identify core PKI concepts such as online, offline, stapling, pinning, key escrow, and certificate chaining. FREE ACCESS
  • Locked
    13.  Course Overview
    49s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 189 users Rating 4.5 of 189 users (189)
Rating 4.4 of 114 users Rating 4.4 of 114 users (114)
Rating 4.3 of 158 users Rating 4.3 of 158 users (158)