Cisco IINS 1.0: Cryptography, Encryption, and Digital Signatures

This course is included in our On-demand training solution.


Cryptographic services form the foundation for many security implementations and provide both confidentiality and integrity of data when that data might be exposed to untrusted parties. Understanding the basic functions of cryptography and how encryption and hashing provide confidentiality and integrity help in the creation of a successful security policy. It is also important to have a good understanding of the issues involved in key management. Cryptographic hashes and digital signatures play a major role in modern cryptosystems, and it is important to have a good understanding of the basic mechanisms of these algorithms and some of the issues that are involved in choosing a particular hashing algorithm or digital signature method. This course provides a primer on the theory of cryptography. It discusses the principles behind symmetric encryption, provides examples of major symmetric encryption algorithms, and examines their operations, strengths, and weaknesses. This course also touches on the major hashing algorithms that use Hashed Message Authentication Code (HMAC), and the digital signature technologies that are widely used in modern computing and networking. It also describes some of the real-world implications of using various algorithms and technologies. The principles behind asymmetric encryption and provides examples of major asymmetric encryption algorithms, including Rivest, Shamir, and Adleman (RSA); Diffie-Hellman (DH); and public key infrastructure (PKI) are also covered. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

Target Audience

Network designers, administrators, engineers, and managers; systems engineers; individuals seeking the Implementing Cisco IOS Network Security (IINS) v1.0 640-553 certification


Knowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Expected Duration

150 min.

Course Objectives

Cryptology and Encryption Basics

  • recognize how cryptography works
  • recognize how cryptanalysis works
  • Algorithms, Ciphers, and Hashes

  • recognize how symmetric and asymmetric encryption algorithms function
  • recognize the differences between and benefits of the basic encryption algorithms
  • Key Management and SSL VPNs

  • recognize the considerations of key management
  • recognize how SSL VPNs work
  • Examining Symmetric Encryption

  • recognize the features of symmetric encryption
  • Hash Algorithms

  • recognize how hash algorithms and the HMAC variant function
  • MD-5, SHA-1, and Digital Signatures

  • recognize the features of the MD5 and SHA-1 algorithms
  • recognize the features of digital signatures
  • Asymmetric Encryption Algorithms

  • recognize the generic functionality of asymmetric encryption algorithms
  • recognize the features of the RSA and DH key exchange algorithms
  • PKI

  • recognize how PKI algorithms function
  • recognize PKI standards
  • Certificate Authorities

  • recognize the role of CAs in a PKI
  • Comparing Encryption Methods