Week 2
Read Chapter 1
Chapter 2-Implementing Public Key Infrastructure
Action – Ian’s Book Key Elements
Read pages 30-58 taking notes
Complete all 59 review questions
Any review questions that are wrong or missing then go back into the chapter and read those areas
Videos – Professor Messer

2.8 Cryptographic Concepts

  • Cryptographic Concepts
  • Symmetric and Asymmetric Cryptography
  • Hashing and Digital Signatures
  • Cryptographic Keys
  • Stream and Block Ciphers
  • Blockchain Technology
  • Cryptographic Use Cases
  • Cryptography limitations
  • Quantum Computing

3.9 Public Key Infrastructure

  • Public Key Infrastructure
  • Certificates
  • Certificate Formats
  • Certificate Concepts
Action – Lab Exercises
Ian’s Website
Lab 4 – How to steal certificates
PBQ – Certificates
Labs | Ian Neil’s Security+ Study Materials (securityplus.training)
Certificate Hierarchy
Certificate Management Concepts
Private Key-use, format and extension
Private Key-use, format and extension
SSH Keys
Symmetric Encryption
Asymmetric Encryption
Homomorphic Encryption
Perfect Forward Secrecy
Key Use:

  • Encryption/Decryption
  • Digital Signature

Ephemeral Keys

  • ROT 13/XOR
  • Steganography

Block Chain/Public Ledger