5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

KnowledgeCenters     IT Security KnowledgeCenter     IT Security Courses
Enterprise assets, including data, must be protected at all times, including when stored, accessed, shared, and transmitted. This course provides an overview of cryptography best practices, including hashing, salting, encryption, and digital signature usage. It also covers cryptography regulatory requirements and best practices for implementing and operating cryptographic systems, including PKI and Web of Trust. This course is one of a series in the learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.

Objectives

Fundamental Cryptography Concepts

  • start the course
  • describe purpose and best practices for applying hashing
  • describe purpose and best practices for applying salting
  • distinguish between symmetric and asymmetric encryption application
  • describe characteristics and best practices for applying digital signatures
  • describe characteristics and best practices for applying non-repudiation

Understanding Cryptography Requirements

  • describe the purpose and role of data sensitivity in cryptography
  • identify regulatory requirements for cryptography
  • identify end-user training best practices related to cryptography

Supporting Secure Protocols

  • compare differences in implementation methodologies
  • describe best practices for appropriate use of security protocols

Implementing Cryptographic Systems

  • identify fundamental key management concepts of cryptographic systems
  • describe how to use PKI as part of implementing and operating cryptographic systems
  • describe administration and validation activities as part of operating and implementing cryptographic systems
  • describe characteristics of Web of Trust
  • identify best practices for implementing secure protocols

Practice: Cryptography & Secure Protocols

  • identify best practices for implementing and operating cryptographic systems and controls