CISM 2020: Cryptography & PKI


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Securing data at rest and in transit over a network is accomplished through the use of cryptography. In this course, you'll explore the concepts of hashing and encryption.

You'll start by studying how cryptography addresses IT security before gaining hands-on experience generating file hashes and encrypting data at rest. Some of the methods you'll practice will be using Microsoft EFS and AxCrypt to protect files, Microsoft BitLocker to protect disk volumes, PuTTYgen to generate key pairs, and wiping disk data.

Moving along, you'll examine and work with PKI certificate authorities, deploying and requesting both Microsoft and AWS certificate authorities. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.



Expected Duration (hours)
1.3

Lesson Objectives

CISM 2020: Cryptography & PKI

  • discover the key concepts covered in this course
  • outline how cryptography addresses IT security
  • generate a hash of a file
  • encrypt files using Microsoft EFS
  • encrypt files using third-party utilities
  • wipe data from disks securely to prevent data retrieval
  • encrypt a disk volume using Microsoft BitLocker
  • use PuTTYgen to generate an RSA key pair
  • describe the PKI hierarchy
  • deploy a Microsoft certificate authority
  • request a certificate from a Microsoft certificate authority
  • deploy a cloud-based certificate authority
  • request a certificate from a cloud-based certificate authority
  • summarize the key concepts covered in this course
  • Course Number:
    it_spcism2020_03_enus

    Expertise Level
    Intermediate