Internet And Network Technologies
Authentication & Encryption Solutions
Authentication & Encryption: Best Practices
it_saauendj_01_enus
Authentication & Encryption: Best Practices
Lesson Objectives
Authentication & Encryption: Best Practices
- discover the key concepts covered in this course
- describe authentication, authorization, and encryption factors and how they fit together
- describe methods of authentication and their best practices
- describe methods of authorization and access control
- describe the use of encryption methods and best practices in implementing encryption
- differentiate between public and private keys and their ciphers
- describe methods of keeping login and authentication credentials secure
- describe system authentication and authorization through user account administration in Linux
- handle security policy trade-offs in situations where solutions might not align with policy
- implement and secure remote access to a system using SSH
- create secure certificates and keys using OpenSSL
- verify software package integrity using OpenSSL
- encrypt and decrypt files with OpenSSL
- summarize the key concepts covered in this course
Overview/Description
Explore the authentication, authorization, and encryption options that a security architect will need on a day-to-day basis. The focus will be on two fronts - from a network security standpoint including cloud services and internal solutions an Agile and DevOps environment.
Target
Prerequisites: none