Systems Security Certified Practitioner: Cryptography

Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices

Prerequisite
None

Expected Duration
64 minutes

Description
Enterprise assets, including data, must be protected at all times, including when stored, accessed, shared, and transmitted. This course provides an overview of cryptography best practices, including hashing, salting, encryption, and digital signature usage. It also covers cryptography regulatory requirements and best practices for implementing and operating cryptographic systems, including PKI and Web of Trust. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.

Objective

Fundamental Cryptography Concepts

  • start the course
  • describe purpose and best practices for applying hashing
  • describe purpose and best practices for applying salting
  • distinguish between symmetric and asymmetric encryption application
  • describe characteristics and best practices for applying digital signatures
  • describe characteristics and best practices for applying non-repudiation

Understanding Cryptography Requirements

  • describe the purpose and role of data sensitivity in cryptography
  • identify regulatory requirements for cryptography
  • identify end-user training best practices related to cryptography

Supporting Secure Protocols

  • compare differences in implementation methodologies
  • describe best practices for appropriate use of security protocols

Implementing Cryptographic Systems

  • identify fundamental key management concepts of cryptographic systems
  • describe how to use PKI as part of implementing and operating cryptographic systems
  • describe administration and validation activities as part of operating and implementing cryptographic systems
  • describe characteristics of Web of Trust
  • identify best practices for implementing secure protocols

Practice: Cryptography & Secure Protocols

  • identify best practices for implementing and operating cryptographic systems and controls

MONTHLY SUBSCRIPTION

$129/month
 

ANNUAL SUBSCRIPTION

$1295/year

Multi-license discounts available for Annual and Monthly subscriptions.