CompTIA Security+: Basic Cryptography & Public Key Infrastructure
CompTIA
| Intermediate
- 13 videos | 1h 13m 47s
- Includes Assessment
- Earns a Badge
To prepare for the CompTIA Security+ SY0-601 certification exam, you will need to be able to identify and describe basic cryptography concepts and their application in everyday use. You'll also need to recognize common aspects of Public Key Infrastructure (PKI). In this CompTIA Security+ SY0-601 course, you'll compare symmetric and asymmetric cryptography, recognize the characteristics of a cryptographic key, and contrast block and stream cipher operations. You'll explore the purpose and features of cryptographic hashing, common key exchange mechanisms, and various next-generation concepts such as lightweight cryptography, quantum and post-quantum computing, and homomorphic encryption. You'll move on to identify the main aspects and core concepts associated with Public Key Infrastructure (PKI). Finally, you'll distinguish several types of certificates and review different certificate formats.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseContrast symmetric and asymmetric cryptosystemsDescribe a cryptographic key including key length, strength, stretching, and perfect forward secrecyCompare block cipher and stream cipher operationsRelate the functions and features of cryptographic hashing including hashed message authentication codes (hmac)Distinguish common key exchange mechanisms such as diffie-hellman and diffie-hellman ephemeralSurvey modes of operation including authenticated (aead), unauthenticated, and counter
-
Interpret advanced concepts such as quantum and post-quantum computing, blockchain, and homomorphic encryptionRecognize everyday use cases like confidentiality, integrity, obfuscation, authentication, and non-repudiationDefine several aspects of pki including key management, certificate authority (ca), certificate revocation list (crl), certificate attributes, the online certificate status protocol (ocsp) and certificate signing requests (csr)Classify different types of certificates such as wildcard, san, code signing, self-signed, machine/computer, email, user, root, domain validation, and extended validation, then survey certificate formats like distinguished encoding rules (der), privacy-enhanced mail (pem), personal information exchange (pfx), .cer, p12, and p7bIdentify core pki concepts such as online, offline, stapling, pinning, key escrow, and certificate chainingSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 32s
-
7m 28sIn this video, find out how to compare symmetric and asymmetric cryptosystems. FREE ACCESS
-
5m 46sUpon completion of this video, you will be able to describe a cryptographic key, including key length, strength, stretching, and perfect forward secrecy. FREE ACCESS
-
6m 54sTo compare block cipher and stream cipher operations, find out how. FREE ACCESS
-
6m 22sIn this video, find out how cryptographic hashing works, including hashed message authentication codes (HMAC). FREE ACCESS
-
5m 37sIn this video, find out how to distinguish between common key exchange mechanisms such as Diffie-Hellman and Diffie-Hellman ephemeral. FREE ACCESS
-
3m 20sIn this video, you will survey modes of operation including authenticated (AEAD), unauthenticated, and counter. FREE ACCESS
-
7m 12sIn this video, you will interpret advanced concepts such as quantum computing, blockchain, and homomorphic encryption. FREE ACCESS
-
4m 16sAfter completing this video, you will be able to recognize everyday use cases such as confidentiality, integrity, obfuscation, authentication, and non-repudiation. FREE ACCESS
-
7m 16sFind out how to define several aspects of PKI including key management, certificate authority (CA), certificate revocation list (CRL), certificate attributes, the Online Certificate Status Protocol (OCSP), and certificate signing requests (CSR). FREE ACCESS
-
9m 27sIn this video, you will learn how to classify different types of certificates, such as wildcard, SAN, code signing, self-signed, machine/computer, email, user, root, domain validation, and extended validation. You will also survey different certificate formats, like Distinguished Encoding Rules (DER), Privacy-enhanced Mail (PEM), Personal Information Exchange (PFX), .cer, P12, and P7B. FREE ACCESS
-
7m 49sIn this video, you will learn how to identify core PKI concepts such as online, offline, stapling, pinning, key escrow, and certificate chaining. FREE ACCESS
-
49s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.