Cryptographic Client-based Systems

  • 10 Videos | 1h 40s
  • Includes Assessment
  • Earns a Badge
Likes 196 Likes 196
Gain an advanced knowledge of cryptographic systems, life cycles, techniques, and methodologies. This course introduces you to cryptology and cryptographic systems. It then examines integrity and hashing in relation to cryptography, explores cryptographic methods and techniques, and discusses the nature of cryptanalytic attacks. You will then learn about the phases of the cryptographic life cycle, digital signatures, and the use and function of public key infrastructure (PKI). From there, you will go on to consider key management practices, such as key stretching, pinning, key escrow, and hardware security modules (HSM). Finally, as a review exercise, you will list three types of ciphers, three types of cryptographic hashing, and three different hashing algorithms.

WHAT YOU WILL LEARN

  • describe cryptology and cryptographic systems
    define integrity and hashing in relation to cryptography
    describe various cryptographic methods and techniques
    identify cryptanalytic attacks
    compare phases of the cryptographic life cycle
  • define digital signatures
    describe the use and function of public key infrastructure
    recall various key management practices
    describe key aspects of digital rights management
    describe cryptographic techniques

IN THIS COURSE

  • Playable
    1. 
    Overview of Cryptology and Cryptographic Systems
    8m 55s
    UP NEXT
  • Playable
    2. 
    Integrity and Cryptographic Hashing
    6m 33s
  • Locked
    3. 
    Cryptographic Methods
    9m 38s
  • Locked
    4. 
    Cryptanalytic Attacks
    4m 15s
  • Locked
    5. 
    Cryptographic Life Cycle
    4m 17s
  • Locked
    6. 
    Digital Signatures
    2m 53s
  • Locked
    7. 
    Public Key Infrastructure (PKI)
    7m 15s
  • Locked
    8. 
    Key Management Practices
    6m 37s
  • Locked
    9. 
    Digital Rights Management (DRM)
    3m 36s
  • Locked
    10. 
    Exercise: Describing Cryptographic Techniques
    2m 14s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 177 Likes 177  
Likes 105 Likes 105  
Likes 176 Likes 176