CompTIA CASP+: Cryptography & PKI
CompTIA
| Intermediate
- 17 videos | 1h 51m 27s
- Includes Assessment
- Earns a Badge
Cryptography has long played a role in securing sensitive information. In this course, you'll begin with an overview of cryptography and how it can secure data at rest and data in motion. You'll then learn how to enable EFS and BitLocker to protect data at rest. You'll explore how to identify methods by which cryptography can protect data in transit and configure network security via IPsec. Finally, you'll examine how PKI uses certificates to secure IT systems through HTTPS, SSH remote management, and generating file system hashes. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how cryptography addresses security concernsDifferentiate between symmetric and asymmetric encryptionRecognize the purpose of hashing and digital signaturesRecognize how to protect data at rest with cryptographyEnable efs to protect data at restEnable bitlocker to protect data at restIdentify methods by which cryptography can protect data in transitConfigure network security via ipsec
-
Recognize the role that pki plays in securityIdentify how pki certificates are used in securityCreate a private certificate authorityConfigure custom pki certificate templatesIssue pki certificates for users and devicesGenerate a certificate in an azure cloud-based key vaultUse common operating system commands to generate file system hashesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 34sThis course reviews cryptography: how to secure data at rest and in motion; how to enable EFS and BitLocker for data at rest; how cryptography protects data in transit; how to configure network security via Ipsec; how to acquire PKI certificates; and how to generate file system hashes. FREE ACCESS
-
8m 19sExplore how cryptography addresses security concerns through technology such as S/MIME, HTTPS, Secure Shell (SSH), VPN, encryption keys, Trusted Platform Module (TPM), hardware security module (HSM), and Password Based Key Derivation Function version 2 (PBKDF2). FREE ACCESS
-
6m 19sExplore and compare symmetric and asymmetric encryption. Discover encryption key types and strategies, such as public keys, private keys, secret keys, the Diffie Hellman key exchange protocol, ciphers, the Digital Encryption Standard, 3DES, the Advanced Encryption standard (AES), RSA, and ECC. FREE ACCESS
-
9m 3sExplore hashing algorithms and digital signature systems. Learn what a rainbow table is and how it is used. Discover Bcrypt, ECDSA, SHA256, Hash-based Message Authentication Code (HMAC), Poly 1305, and the notion of non-repudiation. FREE ACCESS
-
6m 34sDiscover strategies to protect data at rest through cryptography. Explore cryptographic technology examples, such as the Self-Encrypting Drive (SED), the Windows Encrypting File System (EFS), Microsoft BitLocker, and TPM chips. FREE ACCESS
-
6m 53sSee how the Windows Encrypting File System (EFS) protects files. Learn how to configure the Advanced Attributes dialog box, add users, execute cipher commands, and use Microsoft Management Console to view certificates. FREE ACCESS
-
5m 34sExplore how to protect disk volumes with Windows BitLocker. Protect data at rest at the disk level. See how to install BitLocker drive encryption on your system, execute BitLocker commands from the command prompt, and generate recovery keys. FREE ACCESS
-
7m 9sSee how cryptography can protect data in transit, over local area networks, through the Internet, on mobile devices, on social media, and in bank systems. Learn about IPsec, VPNs, TLS, SSL, FTPS, and HTTPS. FREE ACCESS
-
8m 9sLearn how to configure network security via IPsec, apply the Active Directory authentication protocol, manage group policies, manually force a group policy update from the command prompt, and capture IPsec traffic. FREE ACCESS
-
6m 39sIdentify the role that Public Key Infrastructure (PKI) plays in security. Learn about the roles of a Certification Authority (CA), digital security certificates, and the chain of trust. Distinguish the characteristics and uses of public and private CAs. Explore the PKI hierarchy. FREE ACCESS
-
10m 43sIdentify how PKI certificates support security. Explore the PKI certificate lifecycle. Discover how a certification authority performs due diligence to verify certificate holders. Learn about certificate pinning and certificate revocation. FREE ACCESS
-
8m 12sWatch how to create a private Certificate Authority. Follow steps through the Windows Server Manager application wizard. Continue the setup through the private certificate authority menus on the Amazon Web Services (AWS) Certificate Manager. FREE ACCESS
-
6m 11sIn this video, you will see how to configure custom Public Key Infrastructure (PKI) certificate templates. Work with the Server Manager GUI tool and the Certificate Templates Console to setup a custom web server template. FREE ACCESS
-
6m 13sExplore how to issue PKI certificates for users and devices. Work with snap-ins to manage certificates. Establish permissions for Authenticated Users. Use the AWS Management Console's Certificate Manager to setup a private certificate. FREE ACCESS
-
7m 19sGenerate a certificate in an Azure cloud-based key vault. For this example, we will create our own self-certified PKI certificate. See how to add certificate authorities from the Provider dropdown list, such as DigiCert or GlobalSign. FREE ACCESS
-
5m 24sWatch how to use common operating system commands to generate file system hashes. Manually generate file system hashes in Windows and in Linux. Learn about file integrity monitoring (FIM) tools at the enterprise level that you can configure to automatically alert you to file changes. FREE ACCESS
-
1m 13sIn this course, we reviewed cryptography: how to secure data at rest and in motion; how to enable EFS and BitLocker for data at rest; how cryptography protects data in transit; how to configure network security via Ipsec; how to acquire PKI certificates; and how to generate file system hashes. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.