CompTIA Security+: Practical Cryptography
CompTIA Security+
| Beginner
- 11 videos | 43m 54s
- Includes Assessment
- Earns a Badge
Cryptography is at the heart of many security controls and countermeasures and as such, Security+ candidates must have a solid grasp of practical cryptography. In this course, you will discover symmetric and asymmetric cryptography and compare different encryption levels, including full disk and partition. Next, you will explore hashing, salting, hash-based message authentication codes (HMACs), and key exchange. Then you will examine digital signatures, certificates, and public key infrastructure (PKI), focusing on certificate authorities (CAs), certificate signing request (CSR) generation, and Online Certificate Status Protocol (OCSP). Finally, you will investigate cryptographic tools like Trusted Platform Module (TPM), hardware security module, and key management systems, and you will dive into blockchain technology. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe symmetric cryptographyDescribe asymmetric cryptographyCompare encryption levels including full disk, partition, file, volume, database, and recordDefine hashing, salting, and hash-based message authentication codes (hmacs)Provide an overview of key exchange
-
Outline digital signatures and certificatesDescribe pki, including certificate authorities (cas), certificate signing request (csr) generation, certificate revocation lists (crls), online certificate status protocol (ocsp), self-signed certificates, third-party certification, wildcard certificates, and root of trust (rot)Compare cryptographic tools like trusted platform module (tpm), hardware security module (hsm), key management systems, secure enclaves, key stretching, obfuscation with steganography, tokenization, and data maskingDescribe blockchain technologySummarize the key concepts covered in this course
IN THIS COURSE
-
42sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
5m 14sAfter completing this video, you will be able to describe symmetric cryptography. FREE ACCESS
-
3m 54sUpon completion of this video, you will be able to describe asymmetric cryptography. FREE ACCESS
-
3m 27sAfter completing this video, you will be able to compare encryption levels including full disk, partition, file, volume, database, and record. FREE ACCESS
-
4m 19sUpon completion of this video, you will be able to define hashing, salting, and hash-based message authentication codes (HMACs). FREE ACCESS
-
4m 10sAfter completing this video, you will be able to provide an overview of key exchange. FREE ACCESS
-
5m 59sUpon completion of this video, you will be able to outline digital signatures and certificates. FREE ACCESS
-
6m 16sAfter completing this video, you will be able to describe PKI, including certificate authorities (CAs), certificate signing request (CSR) generation, certificate revocation lists (CRLs), Online Certificate Status Protocol (OCSP), self-signed certificates, third-party certification, Wildcard certificates, and root of trust (RoT). FREE ACCESS
-
7m 13sUpon completion of this video, you will be able to compare cryptographic tools like Trusted Platform Module (TPM), hardware security module (HSM), key management systems, secure enclaves, key stretching, obfuscation with steganography, tokenization, and data masking. FREE ACCESS
-
2m 4sAfter completing this video, you will be able to describe blockchain technology. FREE ACCESS
-
36sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.