CompTIA Security+ 2011: Cryptography and Public Key Infrastructures

This course is included in our On-demand training solution.

Overview

Guaranteeing end-to-end security in communication, document, and database infrastructures is incredibly important in internetworking environments. This course examines cryptography and the different algorithms, ciphers and tools that can be used to secure information, and to protect against attacks. Symmetric and asymmetric algorithms are examined, along with block and stream ciphers, one-time pads, and steganography. This course also examines message authentication, digital signatures, Public Key Infrastructures and certification authorization and revocation. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target Audience

Individuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Prerequisites

Expected Duration

150 min.

Course Objectives

Cryptography

  • define key cryptographic terms
  • identify the characteristics of quantum cryptography
  • Symmetric Algorithms and Ciphers

  • describe symmetric key algorithms
  • Asymmetric Algorithms

  • distinguish between types of asymmetric algorithms
  • determine the appropriate use for a given message format
  • Cipher Types

  • recognize types of ciphers
  • Cryptanalysis and Attacks

  • describe various types of cryptanalytic attacks
  • Using Algorithms and Cipher Types

    Message Authentication

  • determine the appropriate hash algorithm to use in a given scenario
  • recognize characteristics of message authentication codes
  • Certificate Authority and Digital Signatures

  • identify the characteristics of digital signatures
  • identify guidelines for key management and distribution
  • New Methods of Key Management

  • identify characteristics of the XKMS
  • recognize the appropriate application of the split knowledge method of key management
  • recognize methods of key distribution
  • Authentication Techniques and Key Management

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?