Authentication & Encryption: Best Practices
Intermediate
- 14 videos | 56m 16s
- Includes Assessment
- Earns a Badge
In this 14-video course, explore the authentication, authorization, and encryption options that a security architect will need on a day-to-day basis. The focus will be on two fronts-from a network security standpoint including cloud services, and internal solutions in an Agile and DevOps environment. Begin with a look at authentication, authorization, and encryption factors and how they fit together, then look at methods of authentication and best practices. This leads into methods of authorization and access control; the use of encryption methods and best practices in implementing encryption; and key symmetry-differentiating between public and private keys and their ciphers. Examine methods of keeping login and authentication credentials secure; view system authentication and authorization through user account administration in Linux, and handle security policy trade-offs in situations where solutions might not align with policy. Discover Secure Shell (SSH) configuration, and implementing and securing remote access to a system using SSH; create secure certificates and keys using OpenSSL; verify software package authenticity by using OpenSSL, and file encryption and file decryption with OpenSSL.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe authentication, authorization, and encryption factors and how they fit togetherDescribe methods of authentication and their best practicesDescribe methods of authorization and access controlDescribe the use of encryption methods and best practices in implementing encryptionDifferentiate between public and private keys and their ciphersDescribe methods of keeping login and authentication credentials secure
-
Describe system authentication and authorization through user account administration in linuxHandle security policy trade-offs in situations where solutions might not align with policyImplement and secure remote access to a system using sshCreate secure certificates and keys using opensslVerify software package integrity using opensslEncrypt and decrypt files with opensslSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 26s
-
3m 23sAfter completing this video, you will be able to describe authentication, authorization, and encryption factors and how they work together. FREE ACCESS
-
4m 51sUpon completion of this video, you will be able to describe methods of authentication and best practices. FREE ACCESS
-
3m 57sAfter completing this video, you will be able to describe methods of authorization and access control. FREE ACCESS
-
2m 52sAfter completing this video, you will be able to describe the use of encryption methods and best practices for implementing encryption. FREE ACCESS
-
3m 7sDuring this video, you will learn how to differentiate between public and private keys and their algorithms. FREE ACCESS
-
4m 31sAfter completing this video, you will be able to describe methods of keeping login and authentication credentials secure. FREE ACCESS
-
5m 44sAfter completing this video, you will be able to describe system authentication and authorization through user account administration in Linux. FREE ACCESS
-
4m 15sIn this video, learn how to handle security policy trade-offs in situations where solutions might not align with policy. FREE ACCESS
-
7m 52sIn this video, find out how to implement and secure remote access to a system using SSH. FREE ACCESS
-
5m 35sIn this video, you will learn how to create secure certificates and keys using OpenSSL. FREE ACCESS
-
3m 39sIn this video, you will verify the integrity of software packages using OpenSSL. FREE ACCESS
-
3m 48sIn this video, you will learn how to encrypt and decrypt files with OpenSSL. FREE ACCESS
-
1m 15s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.