YoVDO

CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation

Offered By: LinkedIn Learning

Tags

CompTIA Security+ (Plus) Courses Cybersecurity Courses Cryptography Courses Information Security Certifications Courses Encryption Courses Asymmetric Cryptography Courses Key Management Courses Symmetric Cryptography Courses Public Key Infrastructure Courses

Course Description

Overview

Review the basics of cryptography, including symmetric and asymmetric encryption standards, as you prepare for the third domain of the CompTIA Security+ (SY0-601) exam.

Syllabus

Introduction
  • Cryptography design and implementation
  • What you need to know
  • Study resources
1. Encryption
  • Understanding encryption
  • Symmetric and asymmetric cryptography
  • Goals of cryptography
  • Codes and ciphers
  • Cryptographic math
  • Choosing encryption algorithms
  • The perfect encryption algorithm
  • The cryptographic lifecycle
2. Symmetric Cryptography
  • Data Encryption Standard (DES)
  • 3DES
  • AES, Blowfish, and Twofish
  • RC4
  • Cipher modes
  • Steganography
3. Asymmetric Cryptography
  • Rivest, Shamir, Adelman (RSA)
  • PGP and GnuPG
  • Elliptic-curve and quantum cryptography
  • Tor and perfect forward secrecy
4. Key Management
  • Key exchange
  • Diffie–Hellman
  • Key escrow
  • Key stretching
  • Hardware security modules
5. Public Key Infrastructure
  • Trust models
  • PKI and digital certificates
  • Hash functions
  • Digital signatures
  • Digital Signature Standard
  • Create a digital certificate
  • Revoke a digital certificate
  • Certificate stapling
  • Certificate authorities
  • Certificate subjects
  • Certificate types
  • Certificate formats
6. Cryptanalytic Attacks
  • Brute force attacks
  • Knowledge-based attacks
  • Limitations of encryption algorithms
7. Cryptographic Applications
  • TLS and SSL
  • Information rights management
  • Specialized use cases
  • Blockchain
Conclusion
  • Continuing your studies

Taught by

Mike Chapple

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network