Encryption Technologies
Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Overview/Description
To discuss techniques for encrypting information
Target Audience
Network administrators, firewall administrators, systems administrators, application developers, and IT security officers
Prerequisites
A good knowledge of networking and internetworking, including a detailed knowledge of the OSI model and the TCP/IP protocol suite
Expected Duration (hours)
4.8
Lesson ObjectivesEncryption Technologies
outline the history of encryption and the reasons why encryption is important.
outline the principles of symmetric encryption.
explain what a block cipher is and identify the algorithms that use them.
discuss the fundamentals of asymmetric encryption.
explain the functionality of hashes and message functions in protecting the integrity of encrypted data.
describe the processes involved in symmetric and asymmetric encryption.
outline the different methods of managing encryption keys.
discuss some practical applications of encryption.
implement a secure encryption scheme on a computer.
exchange encrypted e-mails.
explain the use of certificates for trusted secure public-key implementation.
describe revocation and nonrepudiation of public-key certificates.
discuss the X.509 standard for public-key certificates.
describe public-key infrastructure and Secure Electronic Transactions (SETs).
outline certificate practices, policies, and paths.
Course Number:65873_eng