PLU | Cryptography And PKI For CompTIA Security+ (2017 EN)

Discussion in 'Information Technology' started by Kanka, Jul 27, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,037
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Christopher Rees
    Full Title: Cryptography And PKI For CompTIA Security+
    Year: 2017
    Language: English
    Genre: Educational: Security
    Skill Level: Beginner
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 01:45:08
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 150 kbps
    Audio: AAC at 160 Kbps, 2 channels, 48.0 KHz



    Encryption is a vital component to every company's security posture and provides the means to securely access, transmit, verify, and dispose of data. In this course, you'll learn the fundamentals of cryptography and Public Key Infrastructure (PKI).

    Providing secure communication, access to data, and disposal of assets is no longer essential to every company's overall IT security plan. In this course, Cryptography and PKI for CompTIA Security+, you'll learn the various concepts and components that make up a company's Public Key Infrastructure (PKI). First, you'll delve into the basics of cryptography, including symmetric and asymmetric algorithms, and cipher types. Next, you'll explore the various methods to encrypt data and how to verify a file's integrity. Then, you'll discover how to secure wireless communication using encryption. Finally, you'll learn about the components that make up a PKI. By the end of this course, you'll have the information necessary to discuss and assess your company's PKI, wireless security posture, and identify gaps both internally and externally.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Comparing and Contrasting Basic Cryptography Concepts
    02. Introduction
    03. Cryptographic Terminology
    04. Vigenere Table
    05. Symmetric vs. Asymmetric
    06. Hashing
    07. Elliptic Curve Cryptography
    08. Cipher Suites
    09. Digital Signatures
    10. Entropy, Confusion, and Diffusion
    11. Obfuscation
    12. Block vs. Stream Cipher
    13. Session Keys
    14. Ephemeral Key
    15. Types of Data to Secure
    16. Key Stretching
    17. Implementation vs. Algorithm Selection
    18. Perfect Forward Secrecy
    19. Security Through Obscurity
    3. Deciphering Cryptographic Algorithms
    20. Introduction
    21. Symmetric Algorithms
    22. Blowfish
    23. Twofish
    24. ECB, CBC, OFB, and CFB
    25. Asymmetric Algorithms
    26. PGP/GPG
    27. Hashing Algorithms
    28. Strength and Performance of Algorithms
    4. Installing and Configuring Wireless Security Settings
    29. Introduction
    30. Wireless Definitions
    31. WEP/WPA/WPA2
    32. WPA, WPA2, and Wireless Security Examples
    33. Wireless Security Example - Evil Twin
    34. Wireless Security
    35. EAP, PEAP, and LEAP
    36. 802.11x
    37. WiFi Security Best Practices
    38. Captive Portal
    39. Module Review
    5. Implementing Public Key Infrastructure
    40. Introduction
    41. Certificate Authorities and Digital Certificates
    42. Certificate Authority
    43. CRLs
    44. OCSP
    45. CSR and PKCS Standards
    46. PKI
    47. Public Key
    48. Private Key
    49. OID
    50. Online vs. Offline CAs
    51. Stapling and Pinning
    52. Trust Models
    53. Key Escrow
    54. Types of Certificates
    55. Certificate Formats


    -------------