5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Tech & Dev Essentials     CompTIA     CompTIA Security+ (SY0-601)

To prepare for the CompTIA Security+ SY0-601 certification exam, you will need to be able to identify and describe basic cryptography concepts and their application in everyday use. You'll also need to recognize common aspects of Public Key Infrastructure (PKI). In this CompTIA Security+ SY0-601 course, you'll compare symmetric and asymmetric cryptography, recognize the characteristics of a cryptographic key, and contrast block and stream cipher operations. You'll explore the purpose and features of cryptographic hashing, common key exchange mechanisms, and various next-generation concepts such as lightweight cryptography, quantum and post-quantum computing, and homomorphic encryption. You'll move on to identify the main aspects and core concepts associated with Public Key Infrastructure (PKI). Finally, you'll distinguish several types of certificates and review different certificate formats.



Objectives

SY0-601 - CompTIA Security+: Basic Cryptography & Public Key Infrastructure

  • discover the key concepts covered in this course
  • contrast symmetric and asymmetric cryptosystems
  • describe a cryptographic key including key length, strength, stretching, and perfect forward secrecy
  • compare block cipher and stream cipher operations
  • relate the functions and features of cryptographic hashing including hashed message authentication codes (HMAC)
  • distinguish common key exchange mechanisms such as Diffie-Hellman and Diffie-Hellman ephemeral
  • survey modes of operation including authenticated (AEAD), unauthenticated, and counter
  • interpret advanced concepts such as quantum and post-quantum computing, blockchain, and homomorphic encryption
  • recognize everyday use cases like confidentiality, integrity, obfuscation, authentication, and non-repudiation
  • define several aspects of PKI including key management, certificate authority (CA), certificate revocation list (CRL), certificate attributes, the Online Certificate Status Protocol (OCSP) and certificate signing requests (CSR)
  • classify different types of certificates such as wildcard, SAN, code signing, self-signed, machine/computer, email, user, root, domain validation, and extended validation, then survey certificate formats like Distinguished Encoding Rules (DER), Privacy-enhanced Mail (PEM), Personal Information Exchange (PFX), .cer, P12, and P7B
  • identify core PKI concepts such as online, offline, stapling, pinning, key escrow, and certificate chaining
  • summarize the key concepts covered in this course