Internet And Network Technologies
Authentication & Encryption Solutions
Authentication & Encryption: Best Practices

Authentication & Encryption: Best Practices

Course Number:
Lesson Objectives

Authentication & Encryption: Best Practices

  • discover the key concepts covered in this course
  • describe authentication, authorization, and encryption factors and how they fit together
  • describe methods of authentication and their best practices
  • describe methods of authorization and access control
  • describe the use of encryption methods and best practices in implementing encryption
  • differentiate between public and private keys and their ciphers
  • describe methods of keeping login and authentication credentials secure
  • describe system authentication and authorization through user account administration in Linux
  • handle security policy trade-offs in situations where solutions might not align with policy
  • implement and secure remote access to a system using SSH
  • create secure certificates and keys using OpenSSL
  • verify software package integrity using OpenSSL
  • encrypt and decrypt files with OpenSSL
  • summarize the key concepts covered in this course


Explore the authentication, authorization, and encryption options that a security architect will need on a day-to-day basis. The focus will be on two fronts - from a network security standpoint including cloud services and internal solutions an Agile and DevOps environment.


Prerequisites: none

Close Chat Live