Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
CISA
| Expert
- 16 videos | 1h 1m 5s
- Includes Assessment
- Earns a Badge
Explore how public key infrastructure (PKI) provides a hierarchy of digital security certificates used to secure data and authenticate users and devices and how data are protected with encryption and file integrity verification, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 16-video course include: how cryptography protects data; distinguishing between asymmetric and symmetric encryption; steps in the PKI certificate lifecycle; and how to deploy a private Microsoft CA (certificate authority). Next, learn about configuring customized PKI certificate templates; how Transport Layer Security (TLS) and Internet Protocol Security (IPsec) secure network communications; disabling SSLv3 (secure sockets layer) on clients and servers; and configuring an Internet Information Services (IIS) website with a PKI certificate. Then learn about client PKI certificates for website access; how to protect data at rest with Windows Encrypting File System (EFS); and how to protect data at rest with Windows BitLocker. Finally, learn to use SHA-256 (secure hash algorithm) hashing to verify file integrity; and work with PKI certificates to secure data in transit and at rest.
WHAT YOU WILL LEARN
-
Define how cryptography protects dataDistinguish between asymmetric and symmetric encryptionList elements in the pki hierarchyIdentify the steps in the pki certificate life cycleDeploy a private microsoft caConfigure customized pki certificate templatesRequest a pki certificate manuallyRecognize how tls and ipsec can secure network communications
-
Disable sslv3 on clients and serversConfigure an iis web site with a pki certificateRequire client pki certificates for web site accessProtect data at rest using windows encrypting file systemProtect data at rest using windows bitlockerUse sha-256 hashing to verify file integrityWork with pki certificates to secure data in transit and at rest
IN THIS COURSE
-
2m 22s
-
5m 32sIn this video, you will learn how cryptography protects data. FREE ACCESS
-
4m 32sDuring this video, you will learn how to distinguish between asymmetric and symmetric encryption. FREE ACCESS
-
6m 3sAfter completing this video, you will be able to list the elements in the PKI hierarchy. FREE ACCESS
-
4m 12sIn this video, you will identify the steps in the PKI certificate life cycle. FREE ACCESS
-
3m 13sIn this video, you will deploy a Microsoft CA in a private network. FREE ACCESS
-
3m 14sIn this video, you will learn how to configure customized PKI certificate templates. FREE ACCESS
-
2m 36sIn this video, you will learn how to request a PKI certificate manually. FREE ACCESS
-
4m 23sAfter completing this video, you will be able to recognize how TLS and IPsec can secure network communications. FREE ACCESS
-
2m 20sIn this video, you will learn how to disable SSLv3 on clients and servers. FREE ACCESS
-
3m 48sIn this video, you will learn how to configure an IIS web site with a PKI certificate. FREE ACCESS
-
5m 27sIn this video, find out how to require client PKI certificates for web site access. FREE ACCESS
-
2m 47sIn this video, find out how to protect data at rest using the Windows Encrypting File System. FREE ACCESS
-
4m 45sDuring this video, you will learn how to protect data at rest using Windows BitLocker. FREE ACCESS
-
2m 46sDuring this video, you will learn how to use SHA-256 hashing to verify the integrity of files. FREE ACCESS
-
3m 4sIn this video, you will learn how to work with PKI certificates to secure data in transit and at rest. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.