CompTIA Security+: Practical Cryptography

CompTIA Security+    |    Beginner
  • 11 videos | 43m 54s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Cryptography is at the heart of many security controls and countermeasures and as such, Security+ candidates must have a solid grasp of practical cryptography. In this course, you will discover symmetric and asymmetric cryptography and compare different encryption levels, including full disk and partition. Next, you will explore hashing, salting, hash-based message authentication codes (HMACs), and key exchange. Then you will examine digital signatures, certificates, and public key infrastructure (PKI), focusing on certificate authorities (CAs), certificate signing request (CSR) generation, and Online Certificate Status Protocol (OCSP). Finally, you will investigate cryptographic tools like Trusted Platform Module (TPM), hardware security module, and key management systems, and you will dive into blockchain technology. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe symmetric cryptography
    Describe asymmetric cryptography
    Compare encryption levels including full disk, partition, file, volume, database, and record
    Define hashing, salting, and hash-based message authentication codes (hmacs)
    Provide an overview of key exchange
  • Outline digital signatures and certificates
    Describe pki, including certificate authorities (cas), certificate signing request (csr) generation, certificate revocation lists (crls), online certificate status protocol (ocsp), self-signed certificates, third-party certification, wildcard certificates, and root of trust (rot)
    Compare cryptographic tools like trusted platform module (tpm), hardware security module (hsm), key management systems, secure enclaves, key stretching, obfuscation with steganography, tokenization, and data masking
    Describe blockchain technology
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 42s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 14s
    After completing this video, you will be able to describe symmetric cryptography. FREE ACCESS
  • Locked
    3.  Asymmetric Cryptography
    3m 54s
    Upon completion of this video, you will be able to describe asymmetric cryptography. FREE ACCESS
  • Locked
    4.  Encryption Levels
    3m 27s
    After completing this video, you will be able to compare encryption levels including full disk, partition, file, volume, database, and record. FREE ACCESS
  • Locked
    5.  Hashing, Salting, and HMACs
    4m 19s
    Upon completion of this video, you will be able to define hashing, salting, and hash-based message authentication codes (HMACs). FREE ACCESS
  • Locked
    6.  Key Exchange
    4m 10s
    After completing this video, you will be able to provide an overview of key exchange. FREE ACCESS
  • Locked
    7.  Digital Signatures and Certificates
    5m 59s
    Upon completion of this video, you will be able to outline digital signatures and certificates. FREE ACCESS
  • Locked
    8.  Public Key Infrastructure (PKI)
    6m 16s
    After completing this video, you will be able to describe PKI, including certificate authorities (CAs), certificate signing request (CSR) generation, certificate revocation lists (CRLs), Online Certificate Status Protocol (OCSP), self-signed certificates, third-party certification, Wildcard certificates, and root of trust (RoT). FREE ACCESS
  • Locked
    9.  Cryptographic Tools
    7m 13s
    Upon completion of this video, you will be able to compare cryptographic tools like Trusted Platform Module (TPM), hardware security module (HSM), key management systems, secure enclaves, key stretching, obfuscation with steganography, tokenization, and data masking. FREE ACCESS
  • Locked
    10.  Blockchain Technology
    2m 4s
    After completing this video, you will be able to describe blockchain technology. FREE ACCESS
  • Locked
    11.  Course Summary
    36s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)