Internet And Network Technologies
Getting Started with Cryptography
Cryptography: Introduction to Cryptography Services
it_sabacrdj_01_enus
Cryptography: Introduction to PKI
it_sabacrdj_02_enus
Cryptography: Introduction to Cryptography Services
Lesson Objectives
Cryptography: Introduction to Cryptography Services
- discover the key concepts covered in this course
- define the goals of information security
- describe cryptography services and associate those services with the goals of information security
- describe encryption and encryption history
- use CrypTool and the Caesar cipher
- describe symmetric encryption
- define common symmetric encryption algorithms
- demonstrate CryptTool and symmetric encryption
- describe asymmetric encryption
- define common asymmetric encryption algorithms
- describe the purpose of hashing
- define common hashing algorithms
- use CryptTool and hashing
- download and install CrypTool v1, create a text file, create an MD5 and SHA1 hash of the file, change the file and check the hash value again, and encrypt text with Caesar cipher
Overview/Description
Discover two of the core cryptography services, encryption and hashing. Examine the goals of information security, symmetric and asymmetric encryption, and using the Caesar cipher.
Target
Prerequisites: none
Cryptography: Introduction to PKI
Lesson Objectives
Cryptography: Introduction to PKI
- discover the key concepts covered in this course
- describe PKI and its components
- describe a certificate and the different types of certificates
- configure certificate properties
- identify certificate authority types and hierarchies
- install a certificate authority
- describe how digital signatures work
- describe how SSL is used to secure web traffic
- SSL enable a web site
- define the purpose of a CRL and how it works
- revoke a certificate and describe the effect of revocation
- install a certificate authority and secure web traffic to an IIS webserver by installing a certificate
Overview/Description
Explore Public Key Infrastructure and its components, the basics of certificates and certificate authorities, using a Certificate Revocation List, and how secure web sites work with SSL.
Target
Prerequisites: none