CISM 2022: Applied Cryptography
CISM
| Intermediate
- 14 videos | 1h 16m 17s
- Includes Assessment
- Earns a Badge
The periodic evaluation of the efficacy of cryptographic solutions is possible only with an understanding of how cryptography secures digital environments. In this course, you will explore data integrity by hashing files on the Linux and Windows platforms in an effort to detect unauthorized changes. You will configure a web application HTTPS binding to secure network communications to and from the web application. Then you will deploy a private certificate authority (CA), manage certificate templates, and deploy public key infrastructure (PKI) certificates. Next, you will configure a web application to require trusted client certificates. Finally, you will encrypt data at rest on Linux, on Windows with Encrypting File System (EFS), and Microsoft Bitlocker, and you will configure a cloud VPN connection and implement IPsec on Windows. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseGenerate linux file system hashesGenerate windows file system hashesConfigure an https binding for a web applicationCreate a windows-based private caManage windows public key infrastructure certificate templatesAcquire a pki certificate
-
Configure a web app to require client pki certificatesConfigure efs file encryptionConfigure microsoft bitlocker to protect data at restConfigure linux file system encryption to protect data at restConfigure a user vpn to the azure cloudConfigure ipsec in a windows environmentSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 17sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 32sDuring this video, you will learn how to generate Linux file system hashes. FREE ACCESS
-
6m 25sIn this video, find out how to generate Windows file system hashes. FREE ACCESS
-
6mDuring this video, discover how to configure an HTTPS binding for a web application. FREE ACCESS
-
5m 59sLearn how to create a Windows-based private CA. FREE ACCESS
-
5m 48sFind out how to manage Windows public key infrastructure certificate templates. FREE ACCESS
-
6m 6sIn this video, you will learn how to acquire a PKI certificate. FREE ACCESS
-
6m 14sDiscover how to configure a web app to require client PKI certificates. FREE ACCESS
-
4m 58sDuring this video, you will learn how to configure EFS file encryption. FREE ACCESS
-
7m 11sIn this video, you will learn how to configure Microsoft BitLocker to protect data at rest. FREE ACCESS
-
5m 9sIn this video, discover how to configure Linux file system encryption to protect data at rest. FREE ACCESS
-
6m 4sFind out how to configure a user VPN to the Azure cloud. FREE ACCESS
-
6m 31sLearn how to configure IPsec in a Windows environment. FREE ACCESS
-
1m 2sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.