SSCP®: Cryptography & Networks and Communications (2012 Objectives)
Pluralsight
Course Summary
Part 4 of 5 of the Systems Security Certified Practitioner (SSCP®) series. This series will prepare you for the Systems Security Certified Practitioner (SSCP®) certification.
-
+
Course Description
Part 4 of 5 of the Systems Security Certified Practitioner (SSCP®) series. This series will prepare you for the Systems Security Certified Practitioner (SSCP®) certification. Learn about cool topics like access controls, security operations, security administration, monitoring, analysis, risks, responses, recovery, cryptography, networks, communication, malicious code, and malicious activity. This training course is the perfect entry-level course for someone looking to launch their career in security or advance their current security position.
-
+
Course Syllabus
Concepts and Requirements of Cryptography- 25m 47s
—Introduction 1m 6s
—Cryptography Benefits 2m 17s
—What is Encryption? 1m 10s
—Substitution Cipher 1m 27s
—Symmetric Encryption 2m 44s
—Asymmetric Encryption 1m 16s
—Combining Symmetric and Asymmetric 1m 21s
—Digital Signatures 1m 16s
—Block Ciphers 1m 3s
—Stream Ciphers 0m 49s
—Elliptic Curve Cryptography (ECC) and Hashing 4m 22s
—Transport Encryption 1m 19s
—Steganography 2m 57s
—Cryptography Tips 2m 40sCertificate and Key Management- 31m 49s
—Introduction 1m 46s
—Sending an Encrypted Message 1m 31s
—Digital Certificates 1m 39s
—Certificate Authorities (CAs) 1m 57s
—How Do You Retrieve a Certificate from a PKI? 0m 52s
—Public CAs 1m 38s
—Internet Explorer Trusted CAs 1m 19s
—Internal CAs 3m 13s
—Registration Authorities 2m 19s
—Certificate Revocation Lists (CRLs) 3m 40s
—Recovery Agents 2m 6s
—Key Escrow 2m 2s
—Certificate Management Lifecycle 3m 23s
—CA Trust Models 4m 24sSecure Protocols- 26m 33sNetworks- 45m 39sTelecommunications- 21m 14sRemote Access- 40m 33sFirewalls and Proxies- 30m 48sWireless and Cellular Technologies- 28m 5s