System Security Certified Practitioner (SSCP 2018): Cryptography Primer


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Continue preparing for the Systems Security Certified Practitioner (SSCP) certification exam with this 14-video course, which explores how cryptography can be used to provide confidentiality and integrity for data at rest, and data in transit. You will learn how to acquire a PKI (public key infrastructure), and how to generate a random key to feed into an encryption algorithm. Next, you will examine data hashing and salting. Examine how symmetric and asymmetric encryption provides data confidentiality, and about ECC (elliptic curve cryptography), an asymmetric, cryptographic algorithm. Learners will then explore secure network protocols, including SSL (secure sockets layer), to provide cryptographic functions such as encryption, message authentication, and integrity. This course demonstrates the use of cryptanalysis to identify security flaws, and how to enable IPsec (Internet security protocol) to secure network traffic, and have it applied to all TCP/IP (transmission control protocol/Internet protocol) network traffic. Finally, you will explore how the Telnet and SSH (secure shell) protocols are used for remote administration of things like Linux, Unix, Windows computers.



Expected Duration (hours)
0.8

Lesson Objectives

System Security Certified Practitioner (SSCP 2018): Cryptography Primer

  • Course Overview
  • explain how cryptography can protect IT solutions and how the implementation is often influenced by regulations
  • describe how hashing relates to integrity using algorithms such as HMAC
  • generate a hash for a file to ensure it is authentic and has not been corrupted
  • describe how key lengths relate to cryptographic strength
  • explain how symmetric encryption uses a single key to protect data
  • explain how asymmetric encryption uses related keys to protect data
  • describe ECC cryptography
  • provide examples of how malicious users can attack cryptographic implementations
  • describe how unique digital signatures provide message authenticity
  • explain when to use SSL/TLS, S/MIME, IPSec, and DKIM
  • configure IPSec in a Windows environment
  • demonstrate why Telnet remote administration should never be used
  • determine which cryptographic solutions best meets security needs
  • Course Number:
    it_spsscpdj_04_enus

    Expertise Level
    Intermediate