CISM 2022: Data Protection with Cryptography
CISM
| Intermediate
- 12 videos | 1h 5m 51s
- Includes Assessment
- Earns a Badge
Cryptography provides solutions for ensuring data privacy and integrity. Various firmware and software solutions protect data in transit and data at rest. In this course, you will explore the CIA security triad and how it relates to the organization's security program. You will then review various cryptography solutions and discuss data integrity to assure that tampering has not occurred. Next, you will learn how Hardware Security Module (HSM) appliances and Trusted Platform Module (TPM) firmware provide cryptographic services. You will see how Transport Layer Security (TLS) supersedes the deprecated Secure Sockets Layer (SSL) network security protocol suite followed by discussing virtual private network (VPN) encrypted network tunnels, and the IP Security (IPsec) network security protocol suite. Lastly, you will explore the PKI hierarchy and how public key infrastructure (PKI) certificates are used for digital security throughout the certificate life cycle. This course can be used to prepare for the Certified Information Security Manager (CISM) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline how the cia triad enhances it securityOutline how cryptography protects dataRecognize network and file integrity solutions such as digital signatures, hashes, and checksumsOutline how hardware security modules (hsms) are used for encryption offloading and the storage of cryptographic secretsRecognize how a trusted platform module (tpm) provides a local device cryptographic store
-
Recognize how transport layer security (tls) supersedes secure sockets layer (ssl) for network securityRecognize how virtual private networks (vpns) provide encrypted tunnels to remote networksOutline how the ipsec network security protocol suite protects network trafficRecognize how public key infrastructure (pki) certificates are issued and usedIdentify the stages of the pki certificate lifecycleSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 20sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 27sAfter completing this video, you will be able to outline how the CIA triad enhances IT security. FREE ACCESS
-
6m 23sUpon completion of this video, you will be able to outline how cryptography protects data. FREE ACCESS
-
6m 12sAfter completing this video, you will be able to recognize network and file integrity solutions such as digital signatures, hashes, and checksums. FREE ACCESS
-
5m 42sUpon completion of this video, you will be able to outline how hardware security modules (HSMs) are used for encryption offloading and the storage of cryptographic secrets. FREE ACCESS
-
6m 6sAfter completing this video, you will be able to recognize how a trusted platform module (TPM) provides a local device cryptographic store. FREE ACCESS
-
6m 40sUpon completion of this video, you will be able to recognize how transport layer security (TLS) supersedes secure sockets layer (SSL) for network security. FREE ACCESS
-
7m 23sAfter completing this video, you will be able to recognize how virtual private networks (VPNs) provide encrypted tunnels to remote networks. FREE ACCESS
-
5m 34sUpon completion of this video, you will be able to outline how the IPsec network security protocol suite protects network traffic. FREE ACCESS
-
6m 22sAfter completing this video, you will be able to recognize how public key infrastructure (PKI) certificates are issued and used. FREE ACCESS
-
6m 52sUpon completion of this video, you will be able to identify the stages of the PKI certificate lifecycle. FREE ACCESS
-
50sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.