System Security Certified Practitioner (SSCP 2018): Cryptography Primer
Intermediate
- 14 Videos | 44m
- Includes Assessment
- Earns a Badge
Continue preparing for the Systems Security Certified Practitioner (SSCP) certification exam with this 14-video course, which explores how cryptography can be used to provide confidentiality and integrity for data at rest, and data in transit. You will learn how to acquire a PKI (public key infrastructure), and how to generate a random key to feed into an encryption algorithm. Next, you will examine data hashing and salting. Examine how symmetric and asymmetric encryption provides data confidentiality, and about ECC (elliptic curve cryptography), an asymmetric, cryptographic algorithm. Learners will then explore secure network protocols, including SSL (secure sockets layer), to provide cryptographic functions such as encryption, message authentication, and integrity. This course demonstrates the use of cryptanalysis to identify security flaws, and how to enable IPsec (Internet security protocol) to secure network traffic, and have it applied to all TCP/IP (transmission control protocol/Internet protocol) network traffic. Finally, you will explore how the Telnet and SSH (secure shell) protocols are used for remote administration of things like Linux, Unix, Windows computers.
WHAT YOU WILL LEARN
-
explain how cryptography can protect IT solutions and how the implementation is often influenced by regulationsdescribe how hashing relates to integrity using algorithms such as HMACgenerate a hash for a file to ensure it is authentic and has not been corrupteddescribe how key lengths relate to cryptographic strengthexplain how symmetric encryption uses a single key to protect dataexplain how asymmetric encryption uses related keys to protect datadescribe ECC cryptography
-
provide examples of how malicious users can attack cryptographic implementationsdescribe how unique digital signatures provide message authenticityexplain when to use SSL/TLS, S/MIME, IPSec, and DKIMconfigure IPSec in a Windows environmentdemonstrate why Telnet remote administration should never be useddetermine which cryptographic solutions best meets security needs
IN THIS COURSE
-
1.Course Overview1m 59sUP NEXT
-
2.Cryptography Overview3m 11s
-
3.Hashing3m 52s
-
4.Calculate a Hash for a File2m 53s
-
5.Salting and Key Strength3m 47s
-
6.Symmetric Encryption1m 58s
-
7.Asymmetric Encryption3m 22s
-
8.Elliptic Curve Cryptography2m 45s
-
9.Cryptanalysis and Attacks3m 57s
-
10.Digital Signatures2m 19s
-
11.Secure Protocols3m 55s
-
12.Implement IPSec Between Two Windows Hosts3m 37s
-
13.Compare Telnet and SSH Packet Captures2m 52s
-
14.Exercise: Apply Cryptographic for Protection3m 34s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.