In this webinar, the first of two based on our Cybersecurity Foundations course, you will examine the following topics: verifying users and what they can access, ways a user can be validated to computer and network resources, how cryptography is used to protect data, symmetric and asymmetric encryption and hashes.
Outline:
- Identification
- Something a user knows
- Something a user possesses
- Something a user is or does
- Issues
- Distribution
- Cost
- Tracking
- Elements
- Password Protocols
- Hashes
- Kerberos
- Cryptography Benefits
- Confidentiality
- Encryption
- Integrity
- Message digests
- Authentication
- Public-key cryptography
- Non-Repudiation
- Digital signatures
- Symmetric Encryption
- Asymmetric Process
- Digital Signatures
- Certificate Authorities
- Models
- Lifecycle
- Distribution