This course is included in our On-demand training solution.
To discuss techniques for encrypting information
Network administrators, firewall administrators, systems administrators, application developers, and IT security officers
A good knowledge of networking and internetworking, including a detailed knowledge of the OSI model and the TCP/IP protocol suite
Encryption Technologiesoutline the history of encryption and the reasons why encryption is important.outline the principles of symmetric encryption.explain what a block cipher is and identify the algorithms that use them.discuss the fundamentals of asymmetric encryption.explain the functionality of hashes and message functions in protecting the integrity of encrypted data.describe the processes involved in symmetric and asymmetric encryption.outline the different methods of managing encryption keys.discuss some practical applications of encryption.implement a secure encryption scheme on a computer.exchange encrypted e-mails.explain the use of certificates for trusted secure public-key implementation.describe revocation and nonrepudiation of public-key certificates.discuss the X.509 standard for public-key certificates.describe public-key infrastructure and Secure Electronic Transactions (SETs).outline certificate practices, policies, and paths.