CISM 2020: Cryptography & PKI
CISM
| Intermediate
- 14 videos | 1h 16m
- Includes Assessment
- Earns a Badge
Securing data at rest and in transit over a network is accomplished through the use of cryptography. In this course, you'll explore the concepts of hashing and encryption. You'll start by studying how cryptography addresses IT security before gaining hands-on experience generating file hashes and encrypting data at rest. Some of the methods you'll practice will be using Microsoft EFS and AxCrypt to protect files, Microsoft BitLocker to protect disk volumes, PuTTYgen to generate key pairs, and wiping disk data. Moving along, you'll examine and work with PKI certificate authorities, deploying and requesting both Microsoft and AWS certificate authorities. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline how cryptography addresses it securityGenerate a hash of a fileEncrypt files using microsoft efsEncrypt files using third-party utilitiesWipe data from disks securely to prevent data retrievalEncrypt a disk volume using microsoft bitlocker
-
Use puttygen to generate an rsa key pairDescribe the pki hierarchyDeploy a microsoft certificate authorityRequest a certificate from a microsoft certificate authorityDeploy a cloud-based certificate authorityRequest a certificate from a cloud-based certificate authoritySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 47s
-
7m 43sIn this video, you will outline how cryptography can help improve IT security. FREE ACCESS
-
6m 38sLearn how to generate a hash of a file. FREE ACCESS
-
6m 6sIn this video, find out how to encrypt files using Microsoft's EFS. FREE ACCESS
-
6m 10sIn this video, you will learn how to encrypt files using third-party utilities. FREE ACCESS
-
4m 57sDuring this video, you will learn how to wipe data from disks securely to prevent data retrieval. FREE ACCESS
-
6m 12sIn this video, you will encrypt a disk volume using Microsoft BitLocker. FREE ACCESS
-
7m 3sLearn how to use PuTTYgen to generate an RSA key pair. FREE ACCESS
-
5m 36sUpon completion of this video, you will be able to describe the hierarchy of PKI. FREE ACCESS
-
6m 43sIn this video, learn how to deploy a Microsoft certificate authority. FREE ACCESS
-
6m 34sIn this video, you will learn how to request a certificate from a Microsoft certificate authority. FREE ACCESS
-
5m 18sFind out how to deploy a cloud-based certificate authority. FREE ACCESS
-
4m 1sIn this video, find out how to request a certificate from a cloud-based certificate authority. FREE ACCESS
-
1m 12s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.