Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation

via LinkedIn Learning


Review the basics of cryptography, including symmetric and asymmetric encryption standards, as you prepare for the third domain of the CompTIA Security+ (SY0-601) exam.


  • Cryptography design and implementation
  • What you need to know
  • Study resources
1. Encryption
  • Understanding encryption
  • Symmetric and asymmetric cryptography
  • Goals of cryptography
  • Codes and ciphers
  • Cryptographic math
  • Choosing encryption algorithms
  • The perfect encryption algorithm
  • The cryptographic lifecycle
2. Symmetric Cryptography
  • Data Encryption Standard (DES)
  • 3DES
  • AES, Blowfish, and Twofish
  • RC4
  • Cipher modes
  • Steganography
3. Asymmetric Cryptography
  • Rivest, Shamir, Adelman (RSA)
  • PGP and GnuPG
  • Elliptic-curve and quantum cryptography
  • Tor and perfect forward secrecy
4. Key Management
  • Key exchange
  • Diffie–Hellman
  • Key escrow
  • Key stretching
  • Hardware security modules
5. Public Key Infrastructure
  • Trust models
  • PKI and digital certificates
  • Hash functions
  • Digital signatures
  • Digital Signature Standard
  • Create a digital certificate
  • Revoke a digital certificate
  • Certificate stapling
  • Certificate authorities
  • Certificate subjects
  • Certificate types
  • Certificate formats
6. Cryptanalytic Attacks
  • Brute force attacks
  • Knowledge-based attacks
  • Limitations of encryption algorithms
7. Cryptographic Applications
  • TLS and SSL
  • Information rights management
  • Specialized use cases
  • Blockchain
  • Continuing your studies

Taught by

Mike Chapple


Start your review of CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.