CISM 2020: Cryptography & PKI
Securing data at rest and in transit over a network is accomplished through the use of cryptography. In this course you;ll explore the concepts of hashing and encryption.
You;ll start by studying how cryptography addresses IT security before gaining hands-on experience generating file hashes and encrypting data at rest. Some of the methods you;ll practice will be using Microsoft EFS and AxCrypt to protect files Microsoft BitLocker to protect disk volumes PuTTYgen to generate key pairs and wiping disk data.
Moving along you;ll examine and work with PKI certificate authorities deploying and requesting both Microsoft and AWS certificate authorities. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification.