CISM 2022: Data Protection with Cryptography

CISM    |    Intermediate
  • 12 videos | 1h 5m 51s
  • Includes Assessment
  • Earns a Badge
Rating 4.9 of 12 users Rating 4.9 of 12 users (12)
Cryptography provides solutions for ensuring data privacy and integrity. Various firmware and software solutions protect data in transit and data at rest. In this course, you will explore the CIA security triad and how it relates to the organization's security program. You will then review various cryptography solutions and discuss data integrity to assure that tampering has not occurred. Next, you will learn how Hardware Security Module (HSM) appliances and Trusted Platform Module (TPM) firmware provide cryptographic services. You will see how Transport Layer Security (TLS) supersedes the deprecated Secure Sockets Layer (SSL) network security protocol suite followed by discussing virtual private network (VPN) encrypted network tunnels, and the IP Security (IPsec) network security protocol suite. Lastly, you will explore the PKI hierarchy and how public key infrastructure (PKI) certificates are used for digital security throughout the certificate life cycle. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how the cia triad enhances it security
    Outline how cryptography protects data
    Recognize network and file integrity solutions such as digital signatures, hashes, and checksums
    Outline how hardware security modules (hsms) are used for encryption offloading and the storage of cryptographic secrets
    Recognize how a trusted platform module (tpm) provides a local device cryptographic store
  • Recognize how transport layer security (tls) supersedes secure sockets layer (ssl) for network security
    Recognize how virtual private networks (vpns) provide encrypted tunnels to remote networks
    Outline how the ipsec network security protocol suite protects network traffic
    Recognize how public key infrastructure (pki) certificates are issued and used
    Identify the stages of the pki certificate lifecycle
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 20s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 27s
    After completing this video, you will be able to outline how the CIA triad enhances IT security. FREE ACCESS
  • Locked
    3.  Cryptography
    6m 23s
    Upon completion of this video, you will be able to outline how cryptography protects data. FREE ACCESS
  • Locked
    4.  Integrity
    6m 12s
    After completing this video, you will be able to recognize network and file integrity solutions such as digital signatures, hashes, and checksums. FREE ACCESS
  • Locked
    5.  Hardware Security Module (HSM)
    5m 42s
    Upon completion of this video, you will be able to outline how hardware security modules (HSMs) are used for encryption offloading and the storage of cryptographic secrets. FREE ACCESS
  • Locked
    6.  Trusted Platform Module (TPM)
    6m 6s
    After completing this video, you will be able to recognize how a trusted platform module (TPM) provides a local device cryptographic store. FREE ACCESS
  • Locked
    7.  Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
    6m 40s
    Upon completion of this video, you will be able to recognize how transport layer security (TLS) supersedes secure sockets layer (SSL) for network security. FREE ACCESS
  • Locked
    8.  Virtual Private Networks (VPNs)
    7m 23s
    After completing this video, you will be able to recognize how virtual private networks (VPNs) provide encrypted tunnels to remote networks. FREE ACCESS
  • Locked
    9.  IP Security (IPsec)
    5m 34s
    Upon completion of this video, you will be able to outline how the IPsec network security protocol suite protects network traffic. FREE ACCESS
  • Locked
    10.  Public Key Infrastructure (PKI)
    6m 22s
    After completing this video, you will be able to recognize how public key infrastructure (PKI) certificates are issued and used. FREE ACCESS
  • Locked
    11.  The PKI Certificate Lifecycle
    6m 52s
    Upon completion of this video, you will be able to identify the stages of the PKI certificate lifecycle. FREE ACCESS
  • Locked
    12.  Course Summary
    50s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 4 users Rating 4.8 of 4 users (4)
Rating 4.9 of 7 users Rating 4.9 of 7 users (7)
Rating 4.8 of 11 users Rating 4.8 of 11 users (11)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 2242 users Rating 4.5 of 2242 users (2242)
Rating 4.8 of 4 users Rating 4.8 of 4 users (4)
Rating 4.8 of 21 users Rating 4.8 of 21 users (21)