CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation

Go to class
Write Review

Free Online Course: CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation provided by LinkedIn Learning is a comprehensive online course, which lasts for 2-3 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation is taught by Mike Chapple.

Overview
  • Review the basics of cryptography, including symmetric and asymmetric encryption standards, as you prepare for the third domain of the CompTIA Security+ (SY0-601) exam.

Syllabus
  • Introduction

    • Cryptography design and implementation
    • What you need to know
    • Study resources
    1. Encryption
    • Understanding encryption
    • Symmetric and asymmetric cryptography
    • Goals of cryptography
    • Codes and ciphers
    • Cryptographic math
    • Choosing encryption algorithms
    • The perfect encryption algorithm
    • The cryptographic lifecycle
    2. Symmetric Cryptography
    • Data Encryption Standard (DES)
    • 3DES
    • AES, Blowfish, and Twofish
    • RC4
    • Cipher modes
    • Steganography
    3. Asymmetric Cryptography
    • Rivest, Shamir, Adelman (RSA)
    • PGP and GnuPG
    • Elliptic-curve and quantum cryptography
    • Tor and perfect forward secrecy
    4. Key Management
    • Key exchange
    • Diffie–Hellman
    • Key escrow
    • Key stretching
    • Hardware security modules
    5. Public Key Infrastructure
    • Trust models
    • PKI and digital certificates
    • Hash functions
    • Digital signatures
    • Digital Signature Standard
    • Create a digital certificate
    • Revoke a digital certificate
    • Certificate stapling
    • Certificate authorities
    • Certificate subjects
    • Certificate types
    • Certificate formats
    6. Cryptanalytic Attacks
    • Brute force attacks
    • Knowledge-based attacks
    • Limitations of encryption algorithms
    7. Cryptographic Applications
    • TLS and SSL
    • Information rights management
    • Specialized use cases
    • Blockchain
    Conclusion
    • Continuing your studies