Denise Larson
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Confidentiality, integrity, and availability are core pillars of IT security governance. Cybersecurity analysts can harden IT environments using various encryption and hashing techniques.
In this course, examine how the CIA triad relates to IT security and how cryptography protects sensitive data. Next, discover how to configure Encrypting File System (EFS) file encryption and Microsoft BitLocker encryption, and use a customer-managed key to enable encryption for an Azure storage account. Then learn how to hash files in Linux and Windows. Finally, find out about hardware security modules (HSMs) and the Trusted Platform Module (TPM), how Transport Layer Security (TLS) supersedes the Secure Sockets Layer (SSL), and how to enable HTTPS.
This course can be used to prepare for the ISACA® Certified in Risk and Information Systems Control (CRISC®) certification.
Issued on
March 30, 2025
Expires on
Does not expire