IINS 3.0: Cryptographic Key Exchange

Cisco IINS 3.0    |    Intermediate
  • 2 Videos | 1h 1m 10s
  • Includes Assessment
  • Earns a Badge
Likes 32 Likes 32
For two devices to communicate securely they must have a common key. Explore how keys can be shared and how communications can be encrypted and verified using digital signatures, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.

WHAT YOU WILL LEARN

  • recognize encryption verification methods
    identify terms used in cryptographic key exchanges
    identify the steps taken during public key transmission
    recognize the purpose of certificate authorities
    recognize the characteristics of the cryptographic key exchange process
    specify the purpose of encryption techniques
  • recognize methods used to verify trusted sources
    identify the characteristics of asymmetric key algorithms
    specify the characteristics of certificate authorities
    identify symptoms of untrusted sources
    identify the steps taken in certificate requests

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 20 Likes 20  
Likes 10 Likes 10  
Likes 24 Likes 24  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 30 Likes 30  
Likes 49 Likes 49  
Likes 35 Likes 35