MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

SSCP®: Cryptography & Networks and Communications

Course Summary

Part 4 of 5 of the Systems Security Certified Practitioner (SSCP®) series. This series will prepare you for the Systems Security Certified Practitioner (SSCP®) certification. Learn about cool topics like access controls, security operations, security ad


  • +

    Course Syllabus

    ● Concepts and Requirements of Cryptography
        ◦ Introduction
        ◦ Cryptography Benefits
        ◦ What is Encryption?
        ◦ Substitution Cipher
        ◦ Symmetric Encryption
        ◦ Asymmetric Encryption
        ◦ Combining Symmetric and Asymmetric
        ◦ Digital Signatures
        ◦ Block Ciphers
        ◦ Stream Ciphers
        ◦ Elliptic Curve Cryptography (ECC) and Hashing
        ◦ Transport Encryption
        ◦ Steganography
        ◦ Cryptography Tips
    ● Certificate and Key Management
        ◦ Introduction
        ◦ Sending an Encrypted Message
        ◦ Digital Certificates
        ◦ Certificate Authorities (CAs)
        ◦ How Do You Retrieve a Certificate from a PKI?
        ◦ Public CAs
        ◦ Internet Explorer Trusted CAs
        ◦ Internal CAs
        ◦ Registration Authorities
        ◦ Certificate Revocation Lists (CRLs)
        ◦ Recovery Agents
        ◦ Key Escrow
        ◦ Certificate Management Lifecycle
        ◦ CA Trust Models
    ● Secure Protocols
        ◦ Introduction
        ◦ DES (Data Encryption Standard)
        ◦ 3DES (Triple-DES)
        ◦ AES (Advanced Encryption Standard)
        ◦ RC4 (Rivest Cipher 4)
        ◦ Blowfish
        ◦ Twofish
        ◦ One-time Pads (OTP)
        ◦ Symmetric Algorithm Summary
        ◦ Diffie-Helman
        ◦ RSA
        ◦ ECC (Elliptic Curve Cryptography)
        ◦ Hashing
        ◦ SHA
        ◦ MD5 (Message Digest 5)
        ◦ RIPEMD (RACE Integrity Primitives Evaluation MD)
        ◦ HMAC (Hash-based Message Authentication Code)
        ◦ Hashing Algorithm Summary
        ◦ SSL/TLS and HTTPS
        ◦ SSH (Secure Shell) and IPSec
        ◦ SSTP (Secure Socket Tunneling Protocol)
        ◦ S/MIME (Secure/Multipurpose Internet Mail Extensions)
    ● Networks
        ◦ Logical Models
        ◦ Network Topologies
        ◦ IPv4 Addressing
        ◦ Short Network Notation
        ◦ Private IPv4 Addresses
        ◦ Network Address Translation (NAT)
        ◦ Subnetting
        ◦ DMZ (Demilitarized Zone)
        ◦ Quarantine Networks
        ◦ Protocols and Ports
    ● Telecommunications
        ◦ Traditional Phone Circuit
        ◦ Private Branch Exchange (PBX)
        ◦ VoIP
        ◦ Wireless Voice
        ◦ Fax
    ● Remote Access
        ◦ Client-to-Server VPNs
        ◦ Site-to-Site VPNs
        ◦ VPN Technologies
        ◦ RADIUS
        ◦ Thin Clients
    ● Firewalls and Proxies
        ◦ Introduction
        ◦ Host-based Firewall Pros and Cons
        ◦ Host-based Firewall Features
        ◦ Network Firewall Pros and Cons
        ◦ Packet-Filtering Firewalls
        ◦ Stateless Firewalls
        ◦ Application-Layer Firewalls
        ◦ Firewall Configuration
        ◦ Proxy Servers
        ◦ Firewalls vs. Proxy Servers
    ● Wireless and Cellular Technologies
        ◦ 802.11
        ◦ Improving Wi-Fi Performance
        ◦ Wireless Broadband Technologies
        ◦ Bluetooth
        ◦ RFID

     


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top