SSCP: Cryptography

Intermediate
  • 16 Videos | 1h 3m 20s
  • Includes Assessment
  • Earns a Badge
Likes 14 Likes 14
Enterprise assets, including data, must be protected at all times. Explore cryptography best practices, including hashing, salting, encryption, digital signatures, regulatory requirements, PKI, and Web of Trust.

WHAT YOU WILL LEARN

  • describe purpose and best practices for applying hashing
    describe purpose and best practices for applying salting
    distinguish between symmetric and asymmetric encryption application
    describe characteristics and best practices for applying digital signatures
    describe characteristics and best practices for applying non-repudiation
    describe the purpose and role of data sensitivity in cryptography
    identify regulatory requirements for cryptography
    identify end-user training best practices related to cryptography
  • compare differences in implementation methodologies
    describe best practices for appropriate use of security protocols
    identify fundamental key management concepts of cryptographic systems
    describe how to use PKI as part of implementing and operating cryptographic systems
    describe administration and validation activities as part of operating and implementing cryptographic systems
    describe characteristics of Web of Trust
    identify best practices for implementing secure protocols
    identify best practices for implementing and operating cryptographic systems and controls

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 17 Likes 17  
Likes 14 Likes 14