SSCP 2021: Secure Protocols & Public Key Infrastructure (PKI)

SSCP 2021    |    Intermediate
  • 8 Videos | 38m 46s
  • Includes Assessment
  • Earns a Badge
Early on in the development of TCP/IP and the application layer protocols and services, it was decided not no build native security but rather to add new secure mechanisms and protocols. The aim was to maintain internetworking and interoperability without adding too much overhead. Knowing how these protocols work and how you can implement them will change how you protect your organization's information. Use this course to get abreast of some of the most vital secure protocols and their implementation along with other core services, such as key management, web of trust (WOT), and Public Key Infrastructure (PKI). Upon course completion, you'll be able to detail how and why these protocols and services are used. This course will help you in the lead-up to taking the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    summarize the characteristics and features of IP Security (IPsec), outline what it's used for, and list the various IPsec security profiles (policies)
    outline how Transport Layer Security (TLS) works and describe what SSL/TLS and HTTPS are used for
    compare how S/MIME and DKIM are used for email security
  • recognize the function of various key management concepts, such as storage, rotation, composition, generation, destruction, exchange, revocation, and escrow
    define the web of trust concept and describe a web of trust scenario
    describe how Public Key Infrastructure (PKI) works, the characteristics of two certificate authority (CA) trust models, and the rationale behind certificate revocation and suspension
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 45s
    UP NEXT
  • Playable
    2. 
    IPsec Protocols, Features, & Security Profiles
    7m 58s
  • Locked
    3. 
    How and Why TLS and HTTPS Are Used
    6m
  • Locked
    4. 
    S/MIME and DKIM for Email Security
    3m 18s
  • Locked
    5. 
    Key Management Concepts
    5m 56s
  • Locked
    6. 
    How Web of Trust Works
    4m 39s
  • Locked
    7. 
    How Public Key Infrastructure (PKI) Works
    8m 24s
  • Locked
    8. 
    Course Summary
    46s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE