CISA 2022: Protecting Information Assets
CISA
| Expert
- 16 videos | 1h 24m 6s
- Includes Assessment
- Earns a Badge
Information is a primary asset of most organizations today. It has a real value and, if compromised, could have real implications for the enterprise. In this course, you will explore considerations for protecting information assets, beginning with cryptography, asymmetric and symmetric encryption, Windows Encrypting File System, and Windows BitLocker. Then, you will learn about file integrity, the public key infrastructure (PKI) hierarchy, the PKI certificate life cycle, and private certificate authorities (CAs). Finally, you will discover certificate templates, manual certificate issuance, securing network traffic, disabling SSLv3, enabling an HTTPS website, and client Secure Sockets Layer (SSL)/Transport Layer Security (TLS) certificates. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline how cryptography can be used to protect dataDistinguish between asymmetric and symmetric encryptionProtect data at rest using windows encrypting file systemProtect data at rest using windows bitlockeruse sha-256 hashing to verify file integrityIdentify elements in the public key infrastructure (pki) hierarchyList the steps in the pki certificate life cycle
-
Deploy a private microsoft certificate authority (ca)Configure customized pki certificate templatesRequest a pki certificate manuallyOutline how transport layer security (tls) and internet protocol security (ipsec) can secure network communicationsDisable secure socket layer version 3 (sslv3) on clients and serversConfigure an internet information services (iis) web site with a pki certificaterequire client pki certificates for web site accessSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 7sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 45sAfter completing this video, you will be able to outline how cryptography can be used to protect data. FREE ACCESS
-
5m 37sUpon completion of this video, you will be able to distinguish between asymmetric and symmetric encryption. FREE ACCESS
-
5m 49sIn this video, find out how to protect data at rest using Windows Encrypting File System. FREE ACCESS
-
4m 50sLearn how to protect data at rest using Windows BitLocker. FREE ACCESS
-
6mDuring this video, discover how to use SHA-256 hashing to verify file integrity. FREE ACCESS
-
6m 40sAfter completing this video, you will be able to identify elements in the public key infrastructure (PKI) hierarchy. FREE ACCESS
-
4m 28sUpon completion of this video, you will be able to list the steps in the PKI certificate life cycle. FREE ACCESS
-
7m 42sIn this video, you will learn how to deploy a private Microsoft Certificate Authority (CA). FREE ACCESS
-
6m 11sDiscover how to configure customized PKI certificate templates. FREE ACCESS
-
5m 10sFind out how to request a PKI certificate manually. FREE ACCESS
-
5m 40sAfter completing this video, you will be able to outline how Transport Layer Security (TLS) and Internet Protocol Security (IPsec) can secure network communications. FREE ACCESS
-
6m 3sIn this video, find out how to disable Secure Socket Layer version 3 (SSLv3) on clients and servers. FREE ACCESS
-
5m 31sDuring this video, discover how to configure an Internet Information Services (IIS) web site with a PKI certificate. FREE ACCESS
-
5m 32sIn this video, you will learn how to require client PKI certificates for web site access. FREE ACCESS
-
1m 1sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.