CompTIA Linux+: Security Threats & Cryptography
CompTIA
| Intermediate
- 14 videos | 1h 24m 45s
- Includes Assessment
- Earns a Badge
Managing Linux security properly lessens the impact of security incidents. Cryptography can play a role in securing Linux environments. In this course, I will start by discussing common Linux threats and their mitigations followed by going over the CIA security triad. I will then discuss how cryptography can secure data and how to manage Linux file system encryption. Next, I will discuss integrity and use Linux file system hashing to determine if files have been modified. Lastly, I will discuss the public key infrastructure (PKI) hierarchy, create a private certificate authority (CA) and certificate, discuss Secure Sockets Layer (SSL) and Transport Layer Security (TLS), and enable a Hypertext Transfer Protocol Secure (HTTPS) binding. This course can be used to prepare for the Linux+ XK0-005 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseList common linux threats including social engineering, malware, flawed software, and security misconfigurationsOutline how the cia triad enhances it securityRecognize how cryptography protects dataConfigure linux file system encryption to protect data at restRecognize network and file integrity solutions such as digital signatures, hashes, and checksumsGenerate linux file system hashes
-
Recognize how public key infrastructure (pki) certificates are issued and usedRecognize the various stages of the pki certificate lifecycleCreate a linux-based private certificate authority (ca)Acquire a pki certificateRecognize how transport layer security (tls) supersedes secure sockets layer (ssl) for network securityConfigure a hypertext transfer protocol secure (https) binding for a web applicationSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 4sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
8m 33sAfter completing this video, you will be able to list common Linux threats including social engineering, malware, flawed software, and security misconfigurations. FREE ACCESS
-
6m 30sUpon completion of this video, you will be able to outline how the CIA triad enhances IT security. FREE ACCESS
-
5m 21sAfter completing this video, you will be able to recognize how cryptography protects data. FREE ACCESS
-
6m 52sIn this video, find out how to configure Linux file system encryption to protect data at rest. FREE ACCESS
-
7m 23sUpon completion of this video, you will be able to recognize network and file integrity solutions such as digital signatures, hashes, and checksums. FREE ACCESS
-
8m 12sIn this video, you will learn how to generate Linux file system hashes. FREE ACCESS
-
6m 46sAfter completing this video, you will be able to recognize how public key infrastructure (PKI) certificates are issued and used. FREE ACCESS
-
7m 54sUpon completion of this video, you will be able to recognize the various stages of the PKI certificate lifecycle. FREE ACCESS
-
5m 27sDiscover how to create a Linux-based private certificate authority (CA). FREE ACCESS
-
5m 53sFind out how to acquire a PKI certificate. FREE ACCESS
-
5m 56sAfter completing this video, you will be able to recognize how transport layer security (TLS) supersedes secure sockets layer (SSL) for network security. FREE ACCESS
-
7m 53sLearn how to configure a hypertext transfer protocol secure (HTTPS) binding for a web application. FREE ACCESS
-
1m 1sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.