Vi ste ovdje
CompTIA Security+ 2011: Cryptography and Public Key Infrastructures
Overview/Description
Guaranteeing end-to-end security in communication, document, and database infrastructures is incredibly important in internetworking environments. This course examines cryptography and the different algorithms, ciphers and tools that can be used to secure information, and to protect against attacks. Symmetric and asymmetric algorithms are examined, along with block and stream ciphers, one-time pads, and steganography. This course also examines message authentication, digital signatures, Public Key Infrastructures and certification authorization and revocation. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
Target Audience
Individuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.
Expected Duration (hours)
2.5
Lesson Objectivesdefine key cryptographic terms
identify the characteristics of quantum cryptography
describe symmetric key algorithms
distinguish between types of asymmetric algorithms
determine the appropriate use for a given message format
recognize types of ciphers
describe various types of cryptanalytic attacks
distinguish between types of algorithms, message formats, ciphers, and cryptanalytic attacks
determine the appropriate cryptography implementation for a given scenario
determine the appropriate hash algorithm to use in a given scenario
recognize characteristics of message authentication codes
identify the characteristics of digital signatures
identify guidelines for key management and distribution
identify characteristics of the XKMS
recognize the appropriate application of the split knowledge method of key management
recognize methods of key distribution
determine the appropriate hashing algorithm to use in a given scenario
evaluate the actions of an individual who is practicing key management
recognize examples of key management methods
Guaranteeing end-to-end security in communication, document, and database infrastructures is incredibly important in internetworking environments. This course examines cryptography and the different algorithms, ciphers and tools that can be used to secure information, and to protect against attacks. Symmetric and asymmetric algorithms are examined, along with block and stream ciphers, one-time pads, and steganography. This course also examines message authentication, digital signatures, Public Key Infrastructures and certification authorization and revocation. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
Target Audience
Individuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.
Expected Duration (hours)
2.5
Lesson Objectives
CompTIA Security+ 2011: Cryptography and Public Key Infrastructures
Trajanje:
2,5 h
Šifra:
cs_styp_a08_it_enus
Katalog: