Cryptography for SSCP®
This course will teach you cryptography needed for the SSCP exam.
What you'll learn
Using the appropriate cryptographic algorithms and tools allows an organization to meet various requirements for privacy, confidentiality, and integrity. In this course, Cryptography for SSCP®, you’ll learn to implement cryptography methods and secure protocols. First, you’ll explore encryption terminology and associated regulatory and legal requirements. Next, you’ll discover specific implementation use cases for when particular algorithms are used along with generating and using your own keys. Finally, you’ll learn how to implement secure key management and cryptographic lifecycle practices for your environment. When you’re finished with this course, you’ll have the skills and knowledge of cryptography needed for the SSCP exam.
Table of contents
- Symmetric Algorithms Overview 3m
- Symmetric Stream Based Algorithm Types and Characteristics 3m
- The Initial Block Based Symmetric Algorithm 8m
- Double (2DES) and Triple DES (3DES) 4m
- Symmetric Block Based Algorithm Types and Characteristics 4m
- Demo: AES 5m
- Asymmetric Algorithms Overview 4m
- The Initial Asymmetric Algorithm 3m
- Asymmetric Algorithm Types and Characteristics 4m
- Demo: Generate Private Public Key Pair 2m
- Hashing Algorithms Overview 4m
- Hashing Algorithm Types and Characteristics 4m
- Cryptograpic Implementation and Use Cases 2m
- Cryptographic Protocols and Services IPSEC 4m
- Cryptographic Protocols and Services TLS 3m
- Cryptographic Protocols and Services SMIME 2m
- Cryptographic Protocols and Services – DMARC 2m
- Disk and File Encryption Use Cases 4m
- Public Key Infrastructure Principles 8m
- Demo: Certificate Signing Request 3m
- Cryptanalysis and Limitations of Cryptography 2m
- Cryptanalysis Plaintext and Ciphertext 4m
- Key Management Principles 7m