IINS 3.0: Cryptographic Key Exchange
Cisco IINS 3.0 | Intermediate
- 2 Videos | 1h 1m 10s
- Includes Assessment
- Earns a Badge
For two devices to communicate securely they must have a common key. Explore how keys can be shared and how communications can be encrypted and verified using digital signatures, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
WHAT YOU WILL LEARN
recognize encryption verification methodsidentify terms used in cryptographic key exchangesidentify the steps taken during public key transmissionrecognize the purpose of certificate authoritiesrecognize the characteristics of the cryptographic key exchange processspecify the purpose of encryption techniques
recognize methods used to verify trusted sourcesidentify the characteristics of asymmetric key algorithmsspecify the characteristics of certificate authoritiesidentify symptoms of untrusted sourcesidentify the steps taken in certificate requests
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.