IINS 3.0: Cryptographic Key Exchange

Cisco IINS 3.0
  • 2 Videos | 1h 1m 10s
  • Includes Assessment
  • Earns a Badge
Likes 20 Likes 20
For two devices to communicate securely they must have a common key. Explore how keys can be shared and how communications can be encrypted and verified using digital signatures, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.

WHAT YOU WILL LEARN

  • identify terms used in cryptographic key exchanges
    identify the steps taken during public key transmission
    recognize encryption verification methods
    recognize the characteristics of the cryptographic key exchange process
    recognize the purpose of certificate authorities
    specify the purpose of encryption techniques
  • identify symptoms of untrusted sources
    identify the characteristics of asymmetric key algorithms
    identify the steps taken in certificate requests
    recognize methods used to verify trusted sources
    specify the characteristics of certificate authorities

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 22 Likes 22  
Likes 24 Likes 24  
Likes 18 Likes 18