In modern business and IT, keeping information secure and/or proving from where it originated can be key aspects of success. Cryptography provides the tools necessary to guarantee confidentiality and authenticity in the digital age. This course provides the learner with an understanding of the applications of symmetric and public key cryptography and when they are required as well as concepts such as key management and secure ciphers and protocols. The course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains.
- Define the principal cryptographic terms
- Describe the classic modes of operation for block ciphers
- Describe newer standardized modes of operation for block ciphers
- Identify appropriate uses for stream ciphers and one time pads
- Recognize characteristics of digital signatures
- Describe how to implement a public key infrastructure
- Identify the components of a public key infrastructure
- Determine the most appropriate mode of operation to employ in a particular scenario
- Implement a Public Key Infrastructure for a particular scenario
- Describe types of cryptographic attacks
- Recognize how cryptographic algorithms are used
- Determine the most appropriate hash algorithm to use
- Distinguish between types of secure protocol
- Recognize specific cryptographic attacks
- Determine the most appropriate cryptographic functions to use in a particular scenario
Studied or Worked here? Share Your Review
Please do not post:
Thank you once again for doing your part to keep Edarabia the most trusted education source.