Securing Information using Cryptography

Cybersecurity    |    Beginner
  • 25 videos | 1h 20m 25s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 70 users Rating 4.5 of 70 users (70)
Cryptography is a process used to keep information secret and safe by transforming it into an unrecognizable form that unwanted and unintended recipients cannot understand. In this course, you'll explore how cryptography can be used for confidentiality and integrity. Discover when to use symmetric and asymmetric encryption and discover the advantages and disadvantages of both. Explore practical use cases for cryptography and explore how hashing can be used to ensure data integrity. Discover how digital signatures can provide message integrity, authenticity, and non-repudiation and learn how to implement digital signatures. Discover how to differentiate between rights and permissions and explore access control methods such as discretionary access control, mandatory access control, and role-based access control. Lastly, explore how steganography can be used to hide secret information in or on another object, and how digital rights management (DRM) tools can be used to control access to protected data. This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how cryptography can be used for confidentiality and integrity
    Provide an overview of encryption and how it relates to cryptography
    Recognize when to use symmetric encryption
    List benefits of asymmetric encryption
    List advantages and disadvantages of asymmetric and symmetric encryption
    Provide an overview of how hybrid cryptography can use both asymmetric and symmetric combined
    Discuss considerations when securing data using encryption
    Discuss practical use cases for cryptography
    Recognize how to use hashing to ensure data integrity
    Ensure data integrity by performing file hash verifications
    Describe how hashing works
    Provide an overview of protecting passwords by converting them to hashes
  • Discuss how digital signatures can provide message integrity, authenticity, and non-repudiation
    Recognize how to implement digital signatures
    Describe how permissions are used to explicitly allow access to a resource
    Differentiate between permissions and rights
    Assign permissions and rights to a resource
    Differentiate between centralized and decentralized security management systems
    Provide an overview of discretionary access control (dac)
    Recognize when to use mandatory access control (mac)
    List benefits of the role-based access control (rbac) permissions approach
    Discuss how steganography can be used to hide secret information in or on another object
    Recognize how to hide messages in an image using steganography
    Describe how digital rights management (drm) tools can be used to control access to protected data

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Rating 4.3 of 20 users Rating 4.3 of 20 users (20)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 20 users Rating 4.3 of 20 users (20)
Rating 4.4 of 58 users Rating 4.4 of 58 users (58)
Rating 4.4 of 114 users Rating 4.4 of 114 users (114)