Cryptographic Client-based Systems
Expert
- 10 Videos | 56m 10s
- Includes Assessment
- Earns a Badge
Gain an advanced knowledge of cryptographic systems, life cycles, techniques, and methodologies. This course introduces you to cryptology and cryptographic systems. It then examines integrity and hashing in relation to cryptography, explores cryptographic methods and techniques, and discusses the nature of cryptanalytic attacks. You will then learn about the phases of the cryptographic life cycle, digital signatures, and the use and function of public key infrastructure (PKI). From there, you will go on to consider key management practices, such as key stretching, pinning, key escrow, and hardware security modules (HSM). Finally, as a review exercise, you will list three types of ciphers, three types of cryptographic hashing, and three different hashing algorithms.
WHAT YOU WILL LEARN
-
describe cryptology and cryptographic systemsdefine integrity and hashing in relation to cryptographydescribe various cryptographic methods and techniquesidentify cryptanalytic attackscompare phases of the cryptographic life cycle
-
define digital signaturesdescribe the use and function of public key infrastructurerecall various key management practicesdescribe key aspects of digital rights managementdescribe cryptographic techniques
IN THIS COURSE
-
1.Overview of Cryptology and Cryptographic Systems8m 55sUP NEXT
-
2.Integrity and Cryptographic Hashing6m 33s
-
3.Cryptographic Methods9m 38s
-
4.Cryptanalytic Attacks4m 15s
-
5.Cryptographic Life Cycle4m 17s
-
6.Digital Signatures2m 53s
-
7.Public Key Infrastructure (PKI)7m 15s
-
8.Key Management Practices6m 37s
-
9.Digital Rights Management (DRM)3m 36s
-
10.Exercise: Describing Cryptographic Techniques2m 14s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.