SSCP 2021: Understanding & Applying Cryptography

SSCP    |    Intermediate
  • 10 videos | 41m 58s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 20 users Rating 4.3 of 20 users (20)
Although cryptography isn't covered until domain 5 of the SSCP CBK, potential exam candidates and security professionals will benefit from foundational knowledge of cryptosystems early in their training. Use this course to grasp the reasons and requirements for cryptography in safe-guarding information, including regulations and governance. Investigate cryptographic techniques, such as hashing and salting, symmetric and asymmetric encryption, and elliptic curve cryptography. Discover what's involves in digital signatures and certificates. Explore cryptographic attacks, cryptanalysis, and countermeasures. And delve into advanced cryptosystems, such as quantum computing and blockchain. Upon course completion, you'll be aware of the various traditional and modern cryptology techniques used to protect data and communications. This course will help you in the lead-up to taking the (ISC)² Systems Security Certified Practitioner (SSCP) 2021 exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define and compare cryptography and cryptanalysis, outline cryptographic services, list levels of encryption, and describe ciphers and cryptographic key types
    Describe reasons and use cases for cryptography
    Define and compare hashing and salting
    Describe how symmetric key cryptosystems work and summarize what's meant by block ciphers and stream ciphers
  • Describe how asymmetric key cryptosystems work and summarize different types of key exchanges, such as diffie-hellman
    Outline the components of digital signatures and certificates and name some certificate validation types
    Define cryptanalysis and outline how various crypto attacks work
    Name and describe various advanced cryptosystems
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 44s
  • 7m 6s
  • Locked
    3.  Reasons and Requirements for Cryptography
    2m 44s
  • Locked
    4.  Cryptographic Hashing and Salting
    5m 23s
  • Locked
    5.  Symmetric Key Cryptosystems
    4m 21s
  • Locked
    6.  Asymmetric Key Cryptosystems
    6m 23s
  • Locked
    7.  Digital Signatures and Certificates
    5m 29s
  • Locked
    8.  Cryptanalysis and Cryptographic Attacks
    2m 55s
  • Locked
    9.  Advanced Cryptosystems
    5m 2s
  • Locked
    10.  Course Summary
    51s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 164 users Rating 4.6 of 164 users (164)
Rating 4.9 of 12 users Rating 4.9 of 12 users (12)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.4 of 66 users Rating 4.4 of 66 users (66)
Rating 4.4 of 21 users Rating 4.4 of 21 users (21)