Cryptography & PKI

Cryptography & PKI

Rating
Average: 4 (4 votes)
Cryptography and PKI
Course
Course
Cybersecurity
Subjects
Subjects
Career & Technical Education
Cybersecurity
Grade Levels
Grade Levels
10
11
12
Duration (hours)
Duration (Approx hours)
30
Overview
In this unit, students will learn how to install and configure wireless security settings and implement PKI
Standards
CompTIA Security+ (SYO-501) Objectives 6.1 – 6.4
Cyber Connections
Networks and Internet
Cryptography
Hardware and Software
Threats and Vulnerabilities
Secure Communications
Section Title
Lessons
Accordion Items
Title
6.1 - Compare and contrast basic concepts of cryptography
Content
  • Symmetric Algorithms
  • Modes of Operation
  • Asymmetric Algorithms
  • Hashing
  • Salt
  • Elliptic Curve
  • Weak / Deprecated Algorithms
  • Key Exchange
  • Digital Signatures
  • Diffusion
  • Confusion
  • Collision
  • Steganography
  • Obfuscation
  • Stream vs. Block
  • Key Strength
  • Session Keys
  • Ephemeral Key
  • Secret Algorithm
  • Data-in-Transit
  • Data-at-Rest
  • Data-in-Use
  • Random / Pseudo-Random Number Generation
  • Key Stretching
  • Implementation vs. Algorithm Selection
  • Perfect Forward Secrecy
  • Security Through Obscurity
  • Common Use Cases
Title
6.2 – Explain cryptography algorithms and their basic characteristics
Content
  • Symmetric Algorithms
  • Cipher Modes
  • Asymmetric Algorithms
  • Hashing Algorithms
  • Key Stretching Algorithms
  • Obfuscation
Title
6.3 – Given a scenario, install and configure wireless security settings
Content
  • Cryptographic Protocols
  • Authentication Protocols
  • Methods
Title
6.4 – Given a scenario, implement public key infrastructure
Content
  • Components
  • Concepts
  • Types of Certificates
  • Certificate Formats
    • DER
    • PEM
    • PFX
    • CER
    • P12
    • P7B