Securing Information using Cryptography
Cybersecurity
| Beginner
- 25 videos | 1h 20m 25s
- Includes Assessment
- Earns a Badge
Cryptography is a process used to keep information secret and safe by transforming it into an unrecognizable form that unwanted and unintended recipients cannot understand. In this course, you'll explore how cryptography can be used for confidentiality and integrity. Discover when to use symmetric and asymmetric encryption and discover the advantages and disadvantages of both. Explore practical use cases for cryptography and explore how hashing can be used to ensure data integrity. Discover how digital signatures can provide message integrity, authenticity, and non-repudiation and learn how to implement digital signatures. Discover how to differentiate between rights and permissions and explore access control methods such as discretionary access control, mandatory access control, and role-based access control. Lastly, explore how steganography can be used to hide secret information in or on another object, and how digital rights management (DRM) tools can be used to control access to protected data. This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe how cryptography can be used for confidentiality and integrityProvide an overview of encryption and how it relates to cryptographyRecognize when to use symmetric encryptionList benefits of asymmetric encryptionList advantages and disadvantages of asymmetric and symmetric encryptionProvide an overview of how hybrid cryptography can use both asymmetric and symmetric combinedDiscuss considerations when securing data using encryptionDiscuss practical use cases for cryptographyRecognize how to use hashing to ensure data integrityEnsure data integrity by performing file hash verificationsDescribe how hashing worksProvide an overview of protecting passwords by converting them to hashes
-
Discuss how digital signatures can provide message integrity, authenticity, and non-repudiationRecognize how to implement digital signaturesDescribe how permissions are used to explicitly allow access to a resourceDifferentiate between permissions and rightsAssign permissions and rights to a resourceDifferentiate between centralized and decentralized security management systemsProvide an overview of discretionary access control (dac)Recognize when to use mandatory access control (mac)List benefits of the role-based access control (rbac) permissions approachDiscuss how steganography can be used to hide secret information in or on another objectRecognize how to hide messages in an image using steganographyDescribe how digital rights management (drm) tools can be used to control access to protected data
IN THIS COURSE
-
36s
-
47s
-
8m 2s
-
8m 1s
-
8m 32s
-
1m 58s
-
1m 30s
-
41s
-
4m 40s
-
3m 37s
-
2m 35s
-
1m 43s
-
3m 4s
-
2m 33s
-
4m 5s
-
1m 33s
-
41s
-
3m 3s
-
2m 41s
-
3m 49s
-
3m 54s
-
2m 35s
-
4m 2s
-
2m 48s
-
2m 56s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Audiobook
Real-World Cryptography