Encryption is a vital component to every company's security posture and provides the means to securely access, transmit, verify, and dispose of data. In this course, you'll learn the fundamentals of cryptography and Public Key Infrastructure (PKI).
Providing secure communication, access to data, and disposal of assets is no longer essential to every company's overall IT security plan. In this course, Cryptography and PKI for CompTIA Security+, you'll learn the various concepts and components that make up a company's Public Key Infrastructure (PKI). First, you'll delve into the basics of cryptography, including symmetric and asymmetric algorithms, and cipher types. Next, you'll explore the various methods to encrypt data and how to verify a file's integrity. Then, you'll discover how to secure wireless communication using encryption. Finally, you'll learn about the components that make up a PKI. By the end of this course, you'll have the information necessary to discuss and assess your company's PKI, wireless security posture, and identify gaps both internally and externally.
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
Course Overview Hey everyone, my name is Christopher Rees, and welcome to my course on Cryptography and PKI for CompTIA Security+. In addition to being a trainer here at Pluralsight, I'm also a former law enforcement officer who specialized in computer crimes, and I have over 20 years of enterprise IT experience. I've also been training students from all over the world since 1998. So in this course, we're going to cover the various concepts associated with PKI, or public key infrastructure, which, when you break it down, is one of the cornerstones of an effective cyber security posture. From authenticate and authorization to securing the transmission of sensitive documents and wireless communications, a solid understanding of PKI is essential. So some of the major topics that we'll cover include the basics of cryptography, including the different encryption algorithms, symmetric and asymmetric, along with the various types of ciphers like block and stream. We'll also talk about cryptographic protocols, and the methods you use to secure wireless communications including WEP, WPA, and WPA2. We'll also cover the various components of a public key infrastructure, or PKI, such as certificate authorities, understanding public and private key cryptography and the various types of certificates, along with their associated use cases. By the end of this course, you will understand the key concepts and the key technologies required to properly asses and manage a company's public key infrastructure, no matter how big or small, or what industry it's in. Before beginning the course, having some exposure to CompTIA A+ and/or Network+ concepts is helpful, but not a requirement. From here, you should feel comfortable diving into advanced security topics with courses on CompTIA's Advanced Security Practitioner, and also Malware Analysis: The Big Picture. So I hope you will join me on this journey to learn securing your company's data and communications with cryptography and PKI for CompTIA Security+, here at Pluralsight.