Cisco IINS 1.0: Cryptography, Encryption, and Digital Signatures


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Cryptographic services form the foundation for many security implementations and provide both confidentiality and integrity of data when that data might be exposed to untrusted parties. Understanding the basic functions of cryptography and how encryption and hashing provide confidentiality and integrity help in the creation of a successful security policy. It is also important to have a good understanding of the issues involved in key management. Cryptographic hashes and digital signatures play a major role in modern cryptosystems, and it is important to have a good understanding of the basic mechanisms of these algorithms and some of the issues that are involved in choosing a particular hashing algorithm or digital signature method. This course provides a primer on the theory of cryptography. It discusses the principles behind symmetric encryption, provides examples of major symmetric encryption algorithms, and examines their operations, strengths, and weaknesses. This course also touches on the major hashing algorithms that use Hashed Message Authentication Code (HMAC), and the digital signature technologies that are widely used in modern computing and networking. It also describes some of the real-world implications of using various algorithms and technologies. The principles behind asymmetric encryption and provides examples of major asymmetric encryption algorithms, including Rivest, Shamir, and Adleman (RSA); Diffie-Hellman (DH); and public key infrastructure (PKI) are also covered. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

Target Audience
Network designers, administrators, engineers, and managers; systems engineers; individuals seeking the Implementing Cisco IOS Network Security (IINS) v1.0 640-553 certification

Prerequisites
Knowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Expected Duration (hours)
2.5

Lesson Objectives

Cisco IINS 1.0: Cryptography, Encryption, and Digital Signatures

  • recognize how cryptography works
  • recognize how cryptanalysis works
  • recognize how symmetric and asymmetric encryption algorithms function
  • recognize the differences between and benefits of the basic encryption algorithms
  • recognize the considerations of key management
  • recognize how SSL VPNs work
  • recognize the features of symmetric encryption
  • recognize how hash algorithms and the HMAC variant function
  • recognize the features of the MD5 and SHA-1 algorithms
  • recognize the features of digital signatures
  • recognize the generic functionality of asymmetric encryption algorithms
  • recognize the features of the RSA and DH key exchange algorithms
  • recognize how PKI algorithms function
  • recognize PKI standards
  • recognize the role of CAs in a PKI
  • compare and select an encryption algorithm method based on a set of requirements
  • Course Number:
    cc_iins_a05_it_enus