This course provides an overview of cryptography basics, symmetric and asymmetric key cryptography, and digital certificates. Public Key Infrastructure (PKI), trust models, and key management are also covered.
Differentiate between symmetric and asymmetric key cryptography
Explain the attributes and capabilities of digital certificates
Identify the basic components of the Public Key Infrastructure (PKI)
List the various phases of the certificate lifecycle and the associated key management functions
Concepts of using cryptography
and the cryptosystem
Symmetric key cryptography
Asymmetric key cryptography
Trust models and key management
Key management and certificate lifecycle
128MB of RAM
Windows 2000, 2003, XP
Minimum screen resolution 800x600
Internet Explorer 5.5 or higher
Windows Media Player 9.0 or higher
Flash 8.0 or higher
56K minimum connection; broadband
(256 kpbs or higher) connection
Sound card with speakers or
headphones strongly recommended.
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders, Inc. and the trademark/servicemark proprietor.