Course details

Authentication & Encryption: Best Practices

Authentication & Encryption: Best Practices


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 14-video course, explore the authentication, authorization, and encryption options that a security architect will need on a day-to-day basis. The focus will be on two fronts—from a network security standpoint including cloud services, and internal solutions in an Agile and DevOps environment. Begin with a look at authentication, authorization, and encryption factors and how they fit together, then look at methods of authentication and best practices. This leads into methods of authorization and access control; the use of encryption methods and best practices in implementing encryption; and key symmetry—differentiating between public and private keys and their ciphers. Examine methods of keeping login and authentication credentials secure; view system authentication and authorization through user account administration in Linux, and handle security policy trade-offs in situations where solutions might not align with policy. Discover Secure Shell (SSH) configuration, and implementing and securing remote access to a system using SSH; create secure certificates and keys using OpenSSL; verify software package authenticity by using OpenSSL, and file encryption and file decryption with OpenSSL.



Expected Duration (hours)
0.9

Lesson Objectives

Authentication & Encryption: Best Practices

  • discover the key concepts covered in this course
  • describe authentication, authorization, and encryption factors and how they fit together
  • describe methods of authentication and their best practices
  • describe methods of authorization and access control
  • describe the use of encryption methods and best practices in implementing encryption
  • differentiate between public and private keys and their ciphers
  • describe methods of keeping login and authentication credentials secure
  • describe system authentication and authorization through user account administration in Linux
  • handle security policy trade-offs in situations where solutions might not align with policy
  • implement and secure remote access to a system using SSH
  • create secure certificates and keys using OpenSSL
  • verify software package integrity using OpenSSL
  • encrypt and decrypt files with OpenSSL
  • summarize the key concepts covered in this course
  • Course Number:
    it_saauendj_01_enus

    Expertise Level
    Intermediate