Cryptography and PKI for CompTIA Security+
Encryption is a vital component to every company's security posture and provides the means to securely access, transmit, verify, and dispose of data. In this course, you'll learn the fundamentals of cryptography and Public Key Infrastructure (PKI).
What you'll learn
Providing secure communication, access to data, and disposal of assets is no longer essential to every company's overall IT security plan. In this course, Cryptography and PKI for CompTIA Security+, you'll learn the various concepts and components that make up a company's Public Key Infrastructure (PKI). First, you'll delve into the basics of cryptography, including symmetric and asymmetric algorithms, and cipher types. Next, you'll explore the various methods to encrypt data and how to verify a file's integrity. Then, you'll discover how to secure wireless communication using encryption. Finally, you'll learn about the components that make up a PKI. By the end of this course, you'll have the information necessary to discuss and assess your company's PKI, wireless security posture, and identify gaps both internally and externally.
Table of contents
- Introduction 1m
- Cryptographic Terminology 4m
- Vigenere Table 3m
- Symmetric vs. Asymmetric 4m
- Hashing 2m
- Elliptic Curve Cryptography 1m
- Cipher Suites 2m
- Digital Signatures 1m
- Entropy, Confusion, and Diffusion 2m
- Obfuscation 0m
- Block vs. Stream Cipher 2m
- Session Keys 1m
- Ephemeral Key 1m
- Types of Data to Secure 1m
- Key Stretching 3m
- Implementation vs. Algorithm Selection 1m
- Perfect Forward Secrecy 1m
- Secret Algorithm 0m
- Common Use Cases 4m
- Security Through Obscurity 2m
- Introduction 1m
- Wireless Definitions 2m
- WEP/WPA/WPA2 1m
- WPA, WPA2, and Wireless Security Examples 4m
- Wireless Security Example - Evil Twin 2m
- Wireless Security 3m
- EAP, PEAP, and LEAP 2m
- 802.11x 2m
- WiFi Security Best Practices 4m
- Captive Portal 2m
- RADIUS Federation 0m
- WiFi Protected Setup (WPS) 1m
- Module Review 0m
- Introduction 0m
- Certificate Authorities and Digital Certificates 1m
- Certificate Authority 2m
- CRLs 2m
- OCSP 2m
- CSR and PKCS Standards 1m
- PKI 4m
- Public Key 1m
- Private Key 1m
- OID 2m
- Online vs. Offline CAs 2m
- Stapling and Pinning 1m
- Trust Models 2m
- Key Escrow 1m
- Types of Certificates 5m
- Certification Chaining 1m
- Certificate Formats 2m