Company: Pluralsight Author: Christopher Rees Full Title: Cryptography And PKI For CompTIA Security+ Year: 2017 Language: English Genre: Educational: Security Skill Level: Beginner Price: - - Files: MP4 (+ Slides .PDF) Time: 01:45:08 Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 150 kbps Audio: AAC at 160 Kbps, 2 channels, 48.0 KHz Encryption is a vital component to every company's security posture and provides the means to securely access, transmit, verify, and dispose of data. In this course, you'll learn the fundamentals of cryptography and Public Key Infrastructure (PKI). Providing secure communication, access to data, and disposal of assets is no longer essential to every company's overall IT security plan. In this course, Cryptography and PKI for CompTIA Security+, you'll learn the various concepts and components that make up a company's Public Key Infrastructure (PKI). First, you'll delve into the basics of cryptography, including symmetric and asymmetric algorithms, and cipher types. Next, you'll explore the various methods to encrypt data and how to verify a file's integrity. Then, you'll discover how to secure wireless communication using encryption. Finally, you'll learn about the components that make up a PKI. By the end of this course, you'll have the information necessary to discuss and assess your company's PKI, wireless security posture, and identify gaps both internally and externally. Lessons: 1. Course Overview 01. Course Overview 2. Comparing and Contrasting Basic Cryptography Concepts 02. Introduction 03. Cryptographic Terminology 04. Vigenere Table 05. Symmetric vs. Asymmetric 06. Hashing 07. Elliptic Curve Cryptography 08. Cipher Suites 09. Digital Signatures 10. Entropy, Confusion, and Diffusion 11. Obfuscation 12. Block vs. Stream Cipher 13. Session Keys 14. Ephemeral Key 15. Types of Data to Secure 16. Key Stretching 17. Implementation vs. Algorithm Selection 18. Perfect Forward Secrecy 19. Security Through Obscurity 3. Deciphering Cryptographic Algorithms 20. Introduction 21. Symmetric Algorithms 22. Blowfish 23. Twofish 24. ECB, CBC, OFB, and CFB 25. Asymmetric Algorithms 26. PGP/GPG 27. Hashing Algorithms 28. Strength and Performance of Algorithms 4. Installing and Configuring Wireless Security Settings 29. Introduction 30. Wireless Definitions 31. WEP/WPA/WPA2 32. WPA, WPA2, and Wireless Security Examples 33. Wireless Security Example - Evil Twin 34. Wireless Security 35. EAP, PEAP, and LEAP 36. 802.11x 37. WiFi Security Best Practices 38. Captive Portal 39. Module Review 5. Implementing Public Key Infrastructure 40. Introduction 41. Certificate Authorities and Digital Certificates 42. Certificate Authority 43. CRLs 44. OCSP 45. CSR and PKCS Standards 46. PKI 47. Public Key 48. Private Key 49. OID 50. Online vs. Offline CAs 51. Stapling and Pinning 52. Trust Models 53. Key Escrow 54. Types of Certificates 55. Certificate Formats Our members see more. Join us! ------------- Our members see more. Join us!