CompTIA Linux+: Security Threats & Cryptography

CompTIA    |    Intermediate
  • 14 videos | 1h 24m 45s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 7 users Rating 4.4 of 7 users (7)
Managing Linux security properly lessens the impact of security incidents. Cryptography can play a role in securing Linux environments. In this course, I will start by discussing common Linux threats and their mitigations followed by going over the CIA security triad. I will then discuss how cryptography can secure data and how to manage Linux file system encryption. Next, I will discuss integrity and use Linux file system hashing to determine if files have been modified. Lastly, I will discuss the public key infrastructure (PKI) hierarchy, create a private certificate authority (CA) and certificate, discuss Secure Sockets Layer (SSL) and Transport Layer Security (TLS), and enable a Hypertext Transfer Protocol Secure (HTTPS) binding. This course can be used to prepare for the Linux+ XK0-005 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    List common linux threats including social engineering, malware, flawed software, and security misconfigurations
    Outline how the cia triad enhances it security
    Recognize how cryptography protects data
    Configure linux file system encryption to protect data at rest
    Recognize network and file integrity solutions such as digital signatures, hashes, and checksums
    Generate linux file system hashes
  • Recognize how public key infrastructure (pki) certificates are issued and used
    Recognize the various stages of the pki certificate lifecycle
    Create a linux-based private certificate authority (ca)
    Acquire a pki certificate
    Recognize how transport layer security (tls) supersedes secure sockets layer (ssl) for network security
    Configure a hypertext transfer protocol secure (https) binding for a web application
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 4s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 33s
    After completing this video, you will be able to list common Linux threats including social engineering, malware, flawed software, and security misconfigurations. FREE ACCESS
  • Locked
    3.  The CIA Security Triad
    6m 30s
    Upon completion of this video, you will be able to outline how the CIA triad enhances IT security. FREE ACCESS
  • Locked
    4.  Cryptography
    5m 21s
    After completing this video, you will be able to recognize how cryptography protects data. FREE ACCESS
  • Locked
    5.  Managing Linux File System Encryption
    6m 52s
    In this video, find out how to configure Linux file system encryption to protect data at rest. FREE ACCESS
  • Locked
    6.  Integrity
    7m 23s
    Upon completion of this video, you will be able to recognize network and file integrity solutions such as digital signatures, hashes, and checksums. FREE ACCESS
  • Locked
    7.  Generating File System Hashes Using Linux
    8m 12s
    In this video, you will learn how to generate Linux file system hashes. FREE ACCESS
  • Locked
    8.  Public Key Infrastructure (PKI)
    6m 46s
    After completing this video, you will be able to recognize how public key infrastructure (PKI) certificates are issued and used. FREE ACCESS
  • Locked
    9.  The PKI Certificate Lifecycle
    7m 54s
    Upon completion of this video, you will be able to recognize the various stages of the PKI certificate lifecycle. FREE ACCESS
  • Locked
    10.  Deploying a Private Certificate Authority (CA)
    5m 27s
    Discover how to create a Linux-based private certificate authority (CA). FREE ACCESS
  • Locked
    11.  Acquiring PKI Certificates
    5m 53s
    Find out how to acquire a PKI certificate. FREE ACCESS
  • Locked
    12.  SSL and TLS
    5m 56s
    After completing this video, you will be able to recognize how transport layer security (TLS) supersedes secure sockets layer (SSL) for network security. FREE ACCESS
  • Locked
    13.  Enabling an HTTPS Binding
    7m 53s
    Learn how to configure a hypertext transfer protocol secure (HTTPS) binding for a web application. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 1s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.3 of 15 users Rating 4.3 of 15 users (15)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 284 users Rating 4.5 of 284 users (284)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.5 of 39 users Rating 4.5 of 39 users (39)