Cryptography and PKI for CompTIA Security+
Offered By: Pluralsight
Course Description
Overview
Encryption is a vital component to every company's security posture and provides the means to securely access, transmit, verify, and dispose of data. In this course, you'll learn the fundamentals of cryptography and Public Key Infrastructure (PKI).
Providing secure communication, access to data, and disposal of assets is no longer essential to every company's overall IT security plan. In this course, Cryptography and PKI for CompTIA Security+, you'll learn the various concepts and components that make up a company's Public Key Infrastructure (PKI). First, you'll delve into the basics of cryptography, including symmetric and asymmetric algorithms, and cipher types. Next, you'll explore the various methods to encrypt data and how to verify a file's integrity. Then, you'll discover how to secure wireless communication using encryption. Finally, you'll learn about the components that make up a PKI. By the end of this course, you'll have the information necessary to discuss and assess your company's PKI, wireless security posture, and identify gaps both internally and externally.
Providing secure communication, access to data, and disposal of assets is no longer essential to every company's overall IT security plan. In this course, Cryptography and PKI for CompTIA Security+, you'll learn the various concepts and components that make up a company's Public Key Infrastructure (PKI). First, you'll delve into the basics of cryptography, including symmetric and asymmetric algorithms, and cipher types. Next, you'll explore the various methods to encrypt data and how to verify a file's integrity. Then, you'll discover how to secure wireless communication using encryption. Finally, you'll learn about the components that make up a PKI. By the end of this course, you'll have the information necessary to discuss and assess your company's PKI, wireless security posture, and identify gaps both internally and externally.
Taught by
Christopher Rees
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera