CISM 2022: Applied Cryptography
The periodic evaluation of the efficacy of cryptographic solutions is possible only with an understanding of how cryptography secures digital environments.
In this course you will explore data integrity by hashing files on the Linux and Windows platforms in an effort to detect unauthorized changes. You will configure a web application HTTPS binding to secure network communications to and from the web application. Then you will deploy a private certificate authority (CA) manage certificate templates and deploy public key infrastructure (PKI) certificates. Next you will configure a web application to require trusted client certificates. Finally you will encrypt data at rest on Linux on Windows with Encrypting File System (EFS) and Microsoft Bitlocker and you will configure a cloud VPN connection and implement IPsec on Windows.
This course can be used to prepare for the Certified Information Security Manager (CISM) exam.