CompTIA Cybersecurity Analyst+: Cryptography
Cybersecurity
| Intermediate
- 12 videos | 1h 5m 53s
- Includes Assessment
- Earns a Badge
Confidentiality, integrity, and availability are core pillars of IT security governance. Cybersecurity analysts can harden IT environments using various encryption and hashing techniques. In this course, examine how the CIA triad relates to IT security and how cryptography protects sensitive data. Next, discover how to configure EFS file encryption and Microsoft BitLocker encryption, and use a customer-managed key to enable encryption for an Azure storage account. Finally, learn how to hash files in Linux and Windows, about hardware security modules (HSMs), and how TLS supersedes SSL. This course can be used to prepare for the CS0-003: CompTIA Cybersecurity Analyst+ exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify how the cia triad enhances it securityOutline how cryptography protects dataManage efs file encryptionConfigure microsoft bitlocker to protect data at restConfigure a microsoft azure storage account with a customer-managed key
-
Recognize how cryptography applies to data integrityHash files in linuxManage file hashing in windowsState how hsms are used for encryption offloading and the storage of cryptographic secretsIdentify how tls supersedes ssl for network securitySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 9sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 47sAfter completing this video, you will be able to identify how the CIA triad enhances IT security. FREE ACCESS
-
6m 38sUpon completion of this video, you will be able to outline how cryptography protects data. FREE ACCESS
-
6m 11sDuring this video, discover how to manage EFS file encryption. FREE ACCESS
-
5m 59sIn this video, you will learn how to configure Microsoft BitLocker to protect data at rest. FREE ACCESS
-
8m 9sFind out how to configure a Microsoft Azure storage account with a customer-managed key. FREE ACCESS
-
4m 58sIn this video, you will recognize how cryptography applies to data integrity. FREE ACCESS
-
5m 56sDuring this video, you will learn how to hash files in Linux. FREE ACCESS
-
5m 46sDiscover how to manage file hashing in Windows. FREE ACCESS
-
6m 26sAfter completing this video, you will be able to state how HSMs are used for encryption offloading and the storage of cryptographic secrets. FREE ACCESS
-
6m 58sUpon completion of this video, you will be able to identify how TLS supersedes SSL for network security. FREE ACCESS
-
55sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.