Authentication & Encryption: Best Practices
In this 14-video course explore the authentication authorization and encryption options that a security architect will need on a day-to-day basis. The focus will be on two fronts—from a network security standpoint including cloud services and internal solutions in an Agile and DevOps environment. Begin with a look at authentication authorization and encryption factors and how they fit together then look at methods of authentication and best practices. This leads into methods of authorization and access control; the use of encryption methods and best practices in implementing encryption; and key symmetry—differentiating between public and private keys and their ciphers. Examine methods of keeping login and authentication credentials secure; view system authentication and authorization through user account administration in Linux and handle security policy trade-offs in situations where solutions might not align with policy. Discover Secure Shell (SSH) configuration and implementing and securing remote access to a system using SSH; create secure certificates and keys using OpenSSL; verify software package authenticity by using OpenSSL and file encryption and file decryption with OpenSSL.