Cryptographic Client-based Systems

Expert
  • 10 videos | 56m 10s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 20 users Rating 4.4 of 20 users (20)
Gain an advanced knowledge of cryptographic systems, life cycles, techniques, and methodologies. This course introduces you to cryptology and cryptographic systems. It then examines integrity and hashing in relation to cryptography, explores cryptographic methods and techniques, and discusses the nature of cryptanalytic attacks. You will then learn about the phases of the cryptographic life cycle, digital signatures, and the use and function of public key infrastructure (PKI). From there, you will go on to consider key management practices, such as key stretching, pinning, key escrow, and hardware security modules (HSM). Finally, as a review exercise, you will list three types of ciphers, three types of cryptographic hashing, and three different hashing algorithms.

WHAT YOU WILL LEARN

  • Describe cryptology and cryptographic systems
    Define integrity and hashing in relation to cryptography
    Describe various cryptographic methods and techniques
    Identify cryptanalytic attacks
    Compare phases of the cryptographic life cycle
  • Define digital signatures
    Describe the use and function of public key infrastructure
    Recall various key management practices
    Describe key aspects of digital rights management
    Describe cryptographic techniques

IN THIS COURSE

  • 8m 55s
    After completing this video, you will be able to describe cryptology and cryptographic systems. FREE ACCESS
  • 6m 33s
    In this video, find out how to define integrity and hashing in relation to cryptography. FREE ACCESS
  • Locked
    3.  Cryptographic Methods
    9m 38s
    Upon completion of this video, you will be able to describe various cryptographic methods and techniques. FREE ACCESS
  • Locked
    4.  Cryptanalytic Attacks
    4m 15s
    In this video, find out how to identify cryptographic attacks. FREE ACCESS
  • Locked
    5.  Cryptographic Life Cycle
    4m 17s
    Learn how to compare phases of the cryptographic life cycle. FREE ACCESS
  • Locked
    6.  Digital Signatures
    2m 53s
    In this video, you will learn how to define digital signatures. FREE ACCESS
  • Locked
    7.  Public Key Infrastructure (PKI)
    7m 15s
    Upon completion of this video, you will be able to describe the use and function of a public key infrastructure. FREE ACCESS
  • Locked
    8.  Key Management Practices
    6m 37s
    After completing this video, you will be able to recall various key management practices. FREE ACCESS
  • Locked
    9.  Digital Rights Management (DRM)
    3m 36s
    Upon completion of this video, you will be able to describe key aspects of digital rights management. FREE ACCESS
  • Locked
    10.  Exercise: Describing Cryptographic Techniques
    2m 14s
    Upon completion of this video, you will be able to describe cryptographic techniques. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.3 of 62 users Rating 4.3 of 62 users (62)
Rating 4.6 of 164 users Rating 4.6 of 164 users (164)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 127 users Rating 4.5 of 127 users (127)
Rating 4.7 of 26 users Rating 4.7 of 26 users (26)
Rating 4.3 of 221 users Rating 4.3 of 221 users (221)