IINS 3.0: Cryptographic Key Exchange
Cisco IINS 3.0
2 Videos | 1h 1m 10s
- Includes Assessment
- Earns a Badge
For two devices to communicate securely they must have a common key. Explore how keys can be shared and how communications can be encrypted and verified using digital signatures, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.
WHAT YOU WILL LEARN
identify terms used in cryptographic key exchangesidentify the steps taken during public key transmissionrecognize encryption verification methodsrecognize the characteristics of the cryptographic key exchange processrecognize the purpose of certificate authoritiesspecify the purpose of encryption techniques
identify symptoms of untrusted sourcesidentify the characteristics of asymmetric key algorithmsidentify the steps taken in certificate requestsrecognize methods used to verify trusted sourcesspecify the characteristics of certificate authorities
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE