CRISC 2023: Cryptography
CRISC
| Intermediate
- 14 videos | 1h 18m 11s
- Includes Assessment
- Earns a Badge
Confidentiality, integrity, and availability are core pillars of IT security governance. Cybersecurity analysts can harden IT environments using various encryption and hashing techniques. In this course, examine how the CIA triad relates to IT security and how cryptography protects sensitive data. Next, discover how to configure Encrypting File System (EFS) file encryption and Microsoft BitLocker encryption, and use a customer-managed key to enable encryption for an Azure storage account. Then learn how to hash files in Linux and Windows. Finally, find out about hardware security modules (HSMs) and the Trusted Platform Module (TPM), how Transport Layer Security (TLS) supersedes the Secure Sockets Layer (SSL), and how to enable HTTPS. This course can be used to prepare for the ISACA(r) Certified in Risk and Information Systems Control (CRISC(r)) certification.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine the three items comprising the cia security triadOutline how cryptography protects dataManage efs file encryptionConfigure microsoft bitlocker to protect data at restConfigure a microsoft azure storage account with a customer-managed keyRecognize how cryptography applies to data integrity
-
Hash files in linuxManage file hashing in windowsState how hsms are used for encryption offloading and the storage of cryptographic secretsRecall how tpm provides a local device cryptographic storeIdentify how tls secures network communicationsDetermine risk associated with the use of blockchain technologySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 8sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 49sAfter completing this video, you will be able to define the three items comprising the CIA security triad. FREE ACCESS
-
6m 26sUpon completion of this video, you will be able to outline how cryptography protects data. FREE ACCESS
-
5m 59sIn this video, find out how to manage EFS file encryption. FREE ACCESS
-
5m 24sLearn how to configure Microsoft BitLocker to protect data at rest. FREE ACCESS
-
5m 39sDuring this video, discover how to configure a Microsoft Azure storage account with a customer-managed key. FREE ACCESS
-
7m 48sAfter completing this video, you will be able to recognize how cryptography applies to data integrity. FREE ACCESS
-
6m 27sFind out how to hash files in Linux. FREE ACCESS
-
5m 14sIn this video, you will learn how to manage file hashing in Windows. FREE ACCESS
-
6m 10sUpon completion of this video, you will be able to state how HSMs are used for encryption offloading and the storage of cryptographic secrets. FREE ACCESS
-
5m 5sAfter completing this video, you will be able to recall how TPM provides a local device cryptographic store. FREE ACCESS
-
5m 21sUpon completion of this video, you will be able to identify how TLS secures network communications. FREE ACCESS
-
6m 27sAfter completing this video, you will be able to determine risk associated with the use of blockchain technology. FREE ACCESS
-
1m 12sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.