IINS 3.0: Cryptographic Key Exchange


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

For two devices to communicate securely they must have a common key. Explore how keys can be shared and how communications can be encrypted and verified using digital signatures, as you prepare for the 210-260: Implementing Cisco Network Security certification exam.



Expected Duration (hours)
1.0

Lesson Objectives

IINS 3.0: Cryptographic Key Exchange

  • identify terms used in cryptographic key exchanges
  • identify the steps taken during public key transmission
  • recognize encryption verification methods
  • recognize the characteristics of the cryptographic key exchange process
  • recognize the purpose of certificate authorities
  • specify the purpose of encryption techniques
  • identify symptoms of untrusted sources
  • identify the characteristics of asymmetric key algorithms
  • identify the steps taken in certificate requests
  • recognize methods used to verify trusted sources
  • specify the characteristics of certificate authorities
  • Course Number:
    it_ccnastv_07_04_enus

    Expertise Level
    Intermediate