CRISC 2023: Cryptography

CRISC    |    Intermediate
  • 14 videos | 1h 18m 11s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Confidentiality, integrity, and availability are core pillars of IT security governance. Cybersecurity analysts can harden IT environments using various encryption and hashing techniques. In this course, examine how the CIA triad relates to IT security and how cryptography protects sensitive data. Next, discover how to configure Encrypting File System (EFS) file encryption and Microsoft BitLocker encryption, and use a customer-managed key to enable encryption for an Azure storage account. Then learn how to hash files in Linux and Windows. Finally, find out about hardware security modules (HSMs) and the Trusted Platform Module (TPM), how Transport Layer Security (TLS) supersedes the Secure Sockets Layer (SSL), and how to enable HTTPS. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define the three items comprising the cia security triad
    Outline how cryptography protects data
    Manage efs file encryption
    Configure microsoft bitlocker to protect data at rest
    Configure a microsoft azure storage account with a customer-managed key
    Recognize how cryptography applies to data integrity
  • Hash files in linux
    Manage file hashing in windows
    State how hsms are used for encryption offloading and the storage of cryptographic secrets
    Recall how tpm provides a local device cryptographic store
    Identify how tls secures network communications
    Determine risk associated with the use of blockchain technology
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 8s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 49s
    After completing this video, you will be able to define the three items comprising the CIA security triad. FREE ACCESS
  • Locked
    3.  Cryptography
    6m 26s
    Upon completion of this video, you will be able to outline how cryptography protects data. FREE ACCESS
  • Locked
    4.  Managing Windows Encrypting File System (EFS)
    5m 59s
    In this video, find out how to manage EFS file encryption. FREE ACCESS
  • Locked
    5.  Configuring Microsoft BitLocker
    5m 24s
    Learn how to configure Microsoft BitLocker to protect data at rest. FREE ACCESS
  • Locked
    6.  Encrypting Cloud Storage
    5m 39s
    During this video, discover how to configure a Microsoft Azure storage account with a customer-managed key. FREE ACCESS
  • Locked
    7.  Integrity
    7m 48s
    After completing this video, you will be able to recognize how cryptography applies to data integrity. FREE ACCESS
  • Locked
    8.  Hashing Files in Linux
    6m 27s
    Find out how to hash files in Linux. FREE ACCESS
  • Locked
    9.  Managing File Hashing in Windows
    5m 14s
    In this video, you will learn how to manage file hashing in Windows. FREE ACCESS
  • Locked
    10.  Hardware Security Module (HSM)
    6m 10s
    Upon completion of this video, you will be able to state how HSMs are used for encryption offloading and the storage of cryptographic secrets. FREE ACCESS
  • Locked
    11.  Trusted Platform Module (TPM)
    5m 5s
    After completing this video, you will be able to recall how TPM provides a local device cryptographic store. FREE ACCESS
  • Locked
    12.  Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
    5m 21s
    Upon completion of this video, you will be able to identify how TLS secures network communications. FREE ACCESS
  • Locked
    13.  Blockchain Technology
    6m 27s
    After completing this video, you will be able to determine risk associated with the use of blockchain technology. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 12s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)