CompTIA Security+ 2011: Cryptography and Public Key Infrastructures

Target Audience
Expected Duration
Lesson Objectives
Course Number

Guaranteeing end-to-end security in communication, document, and database infrastructures is incredibly important in internetworking environments. This course examines cryptography and the different algorithms, ciphers and tools that can be used to secure information, and to protect against attacks. Symmetric and asymmetric algorithms are examined, along with block and stream ciphers, one-time pads, and steganography. This course also examines message authentication, digital signatures, Public Key Infrastructures and certification authorization and revocation. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target Audience
Individuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Expected Duration (hours)

Lesson Objectives

CompTIA Security+ 2011: Cryptography and Public Key Infrastructures

  • define key cryptographic terms
  • identify the characteristics of quantum cryptography
  • describe symmetric key algorithms
  • distinguish between types of asymmetric algorithms
  • determine the appropriate use for a given message format
  • recognize types of ciphers
  • describe various types of cryptanalytic attacks
  • distinguish between types of algorithms, message formats, ciphers, and cryptanalytic attacks
  • determine the appropriate cryptography implementation for a given scenario
  • determine the appropriate hash algorithm to use in a given scenario
  • recognize characteristics of message authentication codes
  • identify the characteristics of digital signatures
  • identify guidelines for key management and distribution
  • identify characteristics of the XKMS
  • recognize the appropriate application of the split knowledge method of key management
  • recognize methods of key distribution
  • determine the appropriate hashing algorithm to use in a given scenario
  • evaluate the actions of an individual who is practicing key management
  • recognize examples of key management methods
  • Course Number: