CISM 2022: Data Protection with Cryptography

placeholder

Cryptography provides solutions for ensuring data privacy and integrity. Various firmware and software solutions protect data in transit and data at rest.

In this course you will explore the CIA security triad and how it relates to the organization security program. You will then review various cryptography solutions and discuss data integrity to assure that tampering has not occurred. Next you will learn how Hardware Security Module (HSM) appliances and Trusted Platform Module (TPM) firmware provide cryptographic services. You will see how Transport Layer Security (TLS) supersedes the deprecated Secure Sockets Layer (SSL) network security protocol suite followed by discussing virtual private network (VPN) encrypted network tunnels and the IP Security (IPsec) network security protocol suite. Lastly you will explore the PKI hierarchy and how public key infrastructure (PKI) certificates are used for digital security throughout the certificate life cycle.

This course can be used to prepare for the Certified Information Security Manager (CISM) exam.