Cryptography for SSCP®
Using the appropriate cryptographic algorithms and tools allows an organization to meet various requirements for privacy, confidentiality, and integrity. This course will teach you cryptography needed for the SSCP Exam.
What you'll learn
Using the appropriate cryptographic algorithms and tools allows an organization to meet various privacy, confidentiality, and integrity protocols. In this course, Cryptography for SSCP, you’ll learn to implement cryptography methods and security protocols. First, you’ll explore encryption terminology and associated regulatory and legal requirements. Next, you’ll discover specific implementation use cases for when particular algorithms are used, along with generating and using your own keys. Finally, you’ll learn how to implement secure key management and cryptographic lifecycle practices for your environment. When you’re finished with this course, you’ll have the skills and knowledge of cryptography needed for the SSCP exam.
Table of contents
- Symmetric Algorithms Overview 4m
- Symmetric Stream Based Algorithm Types and Characteristics 3m
- The Initial Block Based Symmetric Algorithm 7m
- Double (2DES) and Triple DES (3DES) 4m
- Symmetric Block Based Algorithm Types and Characteristics 5m
- Demo: AES Encryption Key 5m
- Asymmetric Algorithms Overview 4m
- The Initial Asymmetric Algorithm 3m
- Asymmetric Algorithm Types and Characteristics 4m
- Demo: Generate Private Public Key Pair 2m
- Hashing Algorithms Overview 4m
- Cryptograpic Implementation and Use Cases 1m
- Cryptographic Protocols and Services – Internet Protocol Security (IPSEC) 4m
- Cryptographic Protocols and Services – Transport Layer Security (TLS) 4m
- Cryptographic Protocols and Services Secure Multipurpose Internet Mail Extensions (S MIME) 2m
- Cryptographic Protocols and Services DMARC, SPF, and DKIM 2m
- Disk and File Encryption Use Cases 3m
- Public Key Infrastructure Principles 6m
- Demo: Certificate Signing Request 4m
- Cryptanalysis and Limitations of Cryptography 3m
- Cryptanalysis Plaintext and Ciphertext 3m
- Key Management Principles 7m
- Summary 2m