Cryptography & PKI
Overview
In this unit, students will learn how to install and configure wireless security settings and implement PKI
Standards
CompTIA Security+ (SYO-501) Objectives 6.1 – 6.4
Cyber Connections
Networks and Internet
Cryptography
Hardware and Software
Threats and Vulnerabilities
Secure Communications
Section Title
Lessons
Accordion Items
Title
6.1 - Compare and contrast basic concepts of cryptography
Content
- Symmetric Algorithms
- Modes of Operation
- Asymmetric Algorithms
- Hashing
- Salt
- Elliptic Curve
- Weak / Deprecated Algorithms
- Key Exchange
- Digital Signatures
- Diffusion
- Confusion
- Collision
- Steganography
- Obfuscation
- Stream vs. Block
- Key Strength
- Session Keys
- Ephemeral Key
- Secret Algorithm
- Data-in-Transit
- Data-at-Rest
- Data-in-Use
- Random / Pseudo-Random Number Generation
- Key Stretching
- Implementation vs. Algorithm Selection
- Perfect Forward Secrecy
- Security Through Obscurity
- Common Use Cases
Title
6.2 – Explain cryptography algorithms and their basic characteristics
Content
- Symmetric Algorithms
- Cipher Modes
- Asymmetric Algorithms
- Hashing Algorithms
- Key Stretching Algorithms
- Obfuscation
Title
6.3 – Given a scenario, install and configure wireless security settings
Content
- Cryptographic Protocols
- Authentication Protocols
- Methods
Title
6.4 – Given a scenario, implement public key infrastructure
Content
- Components
- Concepts
- Types of Certificates
- Certificate Formats
- DER
- PEM
- PFX
- CER
- P12
- P7B