CompTIA Cybersecurity Analyst+: Encryption & Hashing

Cybersecurity Analyst+    |    Intermediate
  • 21 videos | 1h 17m 26s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 63 users Rating 4.4 of 63 users (63)
Cryptographers far from enemy lines have long helped win shooting wars by cracking enemy codes-and in the new world of cyber warfare, cryptography has become the first line of defense for hundreds of millions of civilians worldwide. In this 21-video course, you will learn just how cryptography and encryption protect sensitive data, both in transit and at rest. Learners are given important information about public key infrastructure (PKI) hierarchy and lifecycles; protection in UFS (Ultra Flash Storage) and Bitlocker; and on Linux and cloud storage. Learn about the hashing process, including how to generate file hashes for Linux and Windows. Then learn about using SSL (secure sockets layer) and TLS (Transport Layer Security) to secure network traffic, cloud certificate authority (CA) deployment, and certificate issuance. Next, learn how to configure custom encryption keys for cloud storage and how to configure a Microsoft IIS web site with a PKI certificate. The course helps to prepare learners for CompTIA+ Cybersecurity Analyst+ (CySA+) CS0-002 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    List the components of a pki hierarchy
    Define how cryptography protects sensitive data
    Protect data at rest using efs
    Protect data at rest using bitlocker
    Protect data at rest on a linux system
    Configure custom encryption keys for cloud storage
    Recognize the importance of hashing for file systems and network communications
    Generate file hashes on a windows system
    Generate file hashes on a linux system
    Download and verify a checksum for kali linux
  • Identify the steps in the pki certificate lifecycle
    Recognize how ssl and tls are used to secure network traffic
    Disable ssl on web clients and servers
    Deploy a private ca using amazon web services
    Generate a server certificate from an amazon web services private ca
    Deploy a private ca using microsoft certificate services
    Configure a microsoft certificate services template
    Generate a server certificate from a private ca
    Configure a microsoft iis web site with a pki certificate
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 2s
  • 4m 50s
    Upon completion of this video, you will be able to list the components of a PKI hierarchy. FREE ACCESS
  • Locked
    3.  Cryptography
    2m 45s
    In this video, you will learn how cryptography protects sensitive data. FREE ACCESS
  • Locked
    4.  Encrypting File System
    3m 53s
    To protect data at rest, find out how to use EFS. FREE ACCESS
  • Locked
    5.  BitLocker Encryption
    5m 31s
    In this video, find out how to protect data at rest using BitLocker. FREE ACCESS
  • Locked
    6.  Linux Filesystem Encryption
    6m 36s
    During this video, you will learn how to protect data at rest on a Linux system. FREE ACCESS
  • Locked
    7.  Cloud Storage Encryption
    4m 38s
    Find out how to configure custom encryption keys for cloud storage. FREE ACCESS
  • Locked
    8.  Hashing
    2m 48s
    After completing this video, you will be able to recognize the importance of hashing for file systems and network communications. FREE ACCESS
  • Locked
    9.  Windows File Hash Generation
    2m 27s
    In this video, learn how to generate file hashes on a Windows system. FREE ACCESS
  • Locked
    10.  Linux File Hash Generation
    2m 36s
    In this video, you will learn how to generate file hashes on a Linux system. FREE ACCESS
  • Locked
    11.  Internet Download Hash Comparison
    2m 15s
    In this video, you will download and verify the checksum for Kali Linux. FREE ACCESS
  • Locked
    12.  Certificate Lifecycle
    2m 56s
    In this video, you will identify the steps in the PKI certificate lifecycle. FREE ACCESS
  • Locked
    13.  SSL and TLS
    3m 49s
    After completing this video, you will be able to recognize how SSL and TLS are used to secure network traffic. FREE ACCESS
  • Locked
    14.  Disabling SSL
    5m 59s
    In this video, find out how to disable SSL on web clients and servers. FREE ACCESS
  • Locked
    15.  Cloud Certificate Authority Deployment
    3m 17s
    In this video, find out how to deploy a private CA using Amazon Web Services. FREE ACCESS
  • Locked
    16.  Cloud PKI Certificate Issuance
    2m 38s
    In this video, learn how to generate a server certificate from an Amazon Web Services Certificate Authority. FREE ACCESS
  • Locked
    17.  On-premises Certificate Authority Deployment
    5m 15s
    In this video, find out how to deploy a private CA using Microsoft Certificate Services. FREE ACCESS
  • Locked
    18.  On-premises Certificate Templates
    2m 56s
    Learn how to configure a Microsoft Certificate Services template. FREE ACCESS
  • Locked
    19.  On-premises PKI Certificate Issuance
    3m 52s
    In this video, you will generate a server certificate from a private Certificate Authority. FREE ACCESS
  • Locked
    20.  HTTPS On-premises Web Site
    4m 51s
    In this video, you will configure a Microsoft IIS web site to use a PKI certificate. FREE ACCESS
  • Locked
    21.  Course Summary
    1m 31s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 87 users Rating 4.7 of 87 users (87)
Rating 4.6 of 78 users Rating 4.6 of 78 users (78)
Rating 4.2 of 164 users Rating 4.2 of 164 users (164)