SSCP: Cryptography
Intermediate
- 16 videos | 55m 50s
- Includes Assessment
- Earns a Badge
Enterprise assets, including data, must be protected at all times. Explore cryptography best practices, including hashing, salting, encryption, digital signatures, regulatory requirements, PKI, and Web of Trust.
WHAT YOU WILL LEARN
-
Describe purpose and best practices for applying hashingDescribe purpose and best practices for applying saltingDistinguish between symmetric and asymmetric encryption applicationDescribe characteristics and best practices for applying digital signaturesDescribe characteristics and best practices for applying non-repudiationDescribe the purpose and role of data sensitivity in cryptographyIdentify regulatory requirements for cryptographyIdentify end-user training best practices related to cryptography
-
Compare differences in implementation methodologiesDescribe best practices for appropriate use of security protocolsIdentify fundamental key management concepts of cryptographic systemsDescribe how to use pki as part of implementing and operating cryptographic systemsDescribe administration and validation activities as part of operating and implementing cryptographic systemsDescribe characteristics of web of trustIdentify best practices for implementing secure protocolsIdentify best practices for implementing and operating cryptographic systems and controls
IN THIS COURSE
-
3m 55s
-
2m 28s
-
3m
-
2m 54s
-
2m 7s
-
2m 39s
-
3m 27s
-
3m 33s
-
3m 54s
-
4m 40s
-
5m
-
4m 39s
-
4m 9s
-
2m 16s
-
3m 48s
-
3m 24s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.