|
This course provides an overview of cryptography basics, symmetric and asymmetric key cryptography, and digital certificates. Public Key Infrastructure (PKI), trust models, and key management are also covered.
Objectives:
- Differentiate between symmetric and asymmetric key cryptography
- Explain the attributes and capabilities of digital certificates
- Identify the basic components of the Public Key Infrastructure (PKI)
- List the various phases of the certificate lifecycle and the associated key management functions
Topics:
- Concepts of using cryptography
- Cryptography basics
- Encryption, decryption, and the cryptosystem
- Symmetric key cryptography
- Asymmetric key cryptography
- Message authentication
- Digital certificates
- PKI components
- Trust models and key management
- Key management and certificate lifecycle
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|