CompTIA CASP CAS-002: Cryptography and Enterprise Storage Concerns

This course is included in our On-demand training solution.

Overview

Cryptography has been used for thousands of years to secure messages and hide information from those who would seek to steal it. In this course, you’ll learn about cryptographic concepts and techniques along with examining the security implications associated with enterprise storage. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.

Target Audience

Security candidates looking to certify their technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments

Prerequisites

None

Expected Duration

120 min.

Course Objectives

Course Introduction

Key Stretching and Hashing

  • define key stretching and hashing
  • Pseudo Number Generation and Perfect Forward Secrecy

  • define pseudo number generation and perfect forward secrecy
  • Transport and Data at Rest Encryption

  • define transport and data at rest encryption
  • Code Signing and Digital Signatures

  • define code signing and digital signatures
  • Entropy, Diffusion, and Confusion

  • define entropy, diffusion, and confusion
  • The CIA Triad and Non-Repudiation

  • define The CIA triad and non-repudiation
  • Chain of Trust and Root of Trust

  • define chain of trust and root of trust
  • Wild Cards, OCSP, and CRL

  • define wild cards, OCSP, and CRL
  • Issuance and Object Support

  • define issuance, key escrow, and object support
  • Steganography

  • define steganography
  • Cryptographic Applications, and Key Escrow

  • define cryptographic applications and proper/improper implementations
  • Implications of Cryptographic Methods and Design

  • define implications of cryptographic methods and design
  • Strength, Performance, and Feasibility

  • define strength vs. performance vs. feasibility to implement vs. interoperability
  • DRM, Watermarking, and GPG

  • define DRM, watermarking, and GPG
  • SSL, SSH, S/MIME

  • define SSL, SSH, S/MIME
  • Virtual and Cloud Storage

  • define virtual and cloud storage
  • Data Warehousing and Archiving

  • define data warehousing and archiving
  • NAS, SAN, and vSAN

  • define NAS, SAN, and vSAN
  • iSCSI and FCoE

  • define iSCSI and FCoE
  • NFS and CIFS

  • define NFS and CIFS
  • Multipath and Offsite or Multisite Replication

  • define multipath and offsite or multisite replication
  • Snapshots

  • define snapshots and how they are used
  • Deduplication and Dynamic Disk Pools

  • define deduplication and dynamic disk pools
  • LUN Masking and HBA Allocation

  • define LUN masking and HBA allocation
  • Encryption Types

  • define disk, block, file, record and port encryption types
  • Exercise: Cryptography and Enterprise Storage

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?