System Security Certified Practitioner (SSCP 2018): Cryptography Primer

Intermediate
  • 14 videos | 44m
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
Continue preparing for the Systems Security Certified Practitioner (SSCP) certification exam with this 14-video course, which explores how cryptography can be used to provide confidentiality and integrity for data at rest, and data in transit. You will learn how to acquire a PKI (public key infrastructure), and how to generate a random key to feed into an encryption algorithm. Next, you will examine data hashing and salting. Examine how symmetric and asymmetric encryption provides data confidentiality, and about ECC (elliptic curve cryptography), an asymmetric, cryptographic algorithm. Learners will then explore secure network protocols, including SSL (secure sockets layer), to provide cryptographic functions such as encryption, message authentication, and integrity. This course demonstrates the use of cryptanalysis to identify security flaws, and how to enable IPsec (Internet security protocol) to secure network traffic, and have it applied to all TCP/IP (transmission control protocol/Internet protocol) network traffic. Finally, you will explore how the Telnet and SSH (secure shell) protocols are used for remote administration of things like Linux, Unix, Windows computers.

WHAT YOU WILL LEARN

  • Explain how cryptography can protect it solutions and how the implementation is often influenced by regulations
    Describe how hashing relates to integrity using algorithms such as hmac
    Generate a hash for a file to ensure it is authentic and has not been corrupted
    Describe how key lengths relate to cryptographic strength
    Explain how symmetric encryption uses a single key to protect data
    Explain how asymmetric encryption uses related keys to protect data
    Describe ecc cryptography
  • Provide examples of how malicious users can attack cryptographic implementations
    Describe how unique digital signatures provide message authenticity
    Explain when to use ssl/tls, s/mime, ipsec, and dkim
    Configure ipsec in a windows environment
    Demonstrate why telnet remote administration should never be used
    Determine which cryptographic solutions best meets security needs

IN THIS COURSE

  • 1m 59s
  • 3m 11s
    After completing this video, you will be able to explain how cryptography can protect IT solutions and how the implementation is often influenced by regulations. FREE ACCESS
  • Locked
    3.  Hashing
    3m 52s
    Upon completion of this video, you will be able to describe how hashing relates to integrity using algorithms such as HMAC. FREE ACCESS
  • Locked
    4.  Calculate a Hash for a File
    2m 53s
    In this video, find out how to generate a hash for a file to ensure it is authentic and has not been corrupted. FREE ACCESS
  • Locked
    5.  Salting and Key Strength
    3m 47s
    Upon completion of this video, you will be able to describe how cryptographic strength relates to key lengths. FREE ACCESS
  • Locked
    6.  Symmetric Encryption
    1m 58s
    After completing this video, you will be able to explain how symmetric encryption uses a single key to protect data. FREE ACCESS
  • Locked
    7.  Asymmetric Encryption
    3m 22s
    After completing this video, you will be able to explain how asymmetric encryption uses related keys to protect data. FREE ACCESS
  • Locked
    8.  Elliptic Curve Cryptography
    2m 45s
    After completing this video, you will be able to describe elliptic curve cryptography. FREE ACCESS
  • Locked
    9.  Cryptanalysis and Attacks
    3m 57s
    After completing this video, you will be able to provide examples of how malicious users can attack cryptographic implementations. FREE ACCESS
  • Locked
    10.  Digital Signatures
    2m 19s
    After completing this video, you will be able to describe how digital signatures provide message authenticity. FREE ACCESS
  • Locked
    11.  Secure Protocols
    3m 55s
    After completing this video, you will be able to explain when to use SSL/TLS, S/MIME, IPSec, and DKIM. FREE ACCESS
  • Locked
    12.  Implement IPSec Between Two Windows Hosts
    3m 37s
    Find out how to configure IPSec in a Windows environment. FREE ACCESS
  • Locked
    13.  Compare Telnet and SSH Packet Captures
    2m 52s
    In this video, you will learn why Telnet remote administration is not secure. FREE ACCESS
  • Locked
    14.  Exercise: Apply Cryptographic for Protection
    3m 34s
    In this video, you will determine which cryptographic solution best meets your security needs. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 54 users Rating 4.6 of 54 users (54)
Rating 4.4 of 23 users Rating 4.4 of 23 users (23)
Rating 4.6 of 256 users Rating 4.6 of 256 users (256)