Take this
course

Software Development / Security & Encryption

Cryptography

We will discuss the steps to create and manage a public key infrastructure, certificate authority, traditional and public key cryptography, and the implementation and management of certificates.

Description

Traditional cryptography uses a secret key for encrypting and decrypting a message. This is also known as a symmetric key. In public key cryptography, the CA creates private and public keys using the same algorithm, but it functions asymmetrically. 


In this Cryptography course you will discuss public key infrastructures, certificate authorities, and certificate management. We will combine that with in-depth demos on PKI Installation, CRL, Certificate Enrollment, and CA Management. We will discuss the steps to create and manage a public key infrastructure, and the relationship between public key infrastructures and certificate authority, as well as both traditional cryptography and public key cryptography, the implementation of certificates, and managing certificates. 


Topics Covered Include: 

  • Certificates
  • Using Secure Certificates 

Take Advantage of our extra downloadable supplemental materials. 

**This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Cryptography.

Full details

Curriculum

  • Certificates
    Introduction
    0:31
    Public key Infrastructure (PKI)
    2:30
    DEMO: PKI Installation
    11:34
    Certificate Authority (CA)
    0:49
    DEMO: Confi-complete
    7:55
    DEMO: CRL
    4:09
    DEMO: Enroll Certificate
    2:53
  • Using Secure Certificates
    Secure Communication with Certificates
    3:01
    Certificate Management
    2:00
    DEMO: CA Management
    6:22
  • Conclusion
    Conclusion
    0:35
    Cryptography: Supplemental Materials
    Take advantage of all our extra downloadable supplemental materials. This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Cryptography Chapters 1 & 2.

Skills

  • Certified Ethical Hacker (CEH)
  • CompTIA Security+
  • IT Certification
  • IT Security
  • IT Security Certification
  • Information Security
  • Information Systems Security

Similar Courses

More Courses by this Instructor