Designing VPN Security. Student Guide
Cisco Press
Upon completion of this course, you will be able to perform the following tasks:
• Recognize the services offered by cryptography and recommend those services to an organization to address their
specific needs.
• Describe various encryption, hashing, and signing algorithms and select the best algorithm in a design situation.
• Explain the role of key management in cryptography.
• Explain specific guidelines which need to be considered whendeploying cryptographic systems.
• Select the best practices of key management in a design situation.
• Recognize the services offered by cryptography and recommend those services to an organization to address their
specific needs.
• Describe various encryption, hashing, and signing algorithms and select the best algorithm in a design situation.
• Explain the role of key management in cryptography.
• Explain specific guidelines which need to be considered whendeploying cryptographic systems.
• Select the best practices of key management in a design situation.
Категории:
Год:
2003
Издание:
1.0
Издательство:
Cisco Press
Язык:
english
Страницы:
1050
Файл:
PDF, 8.21 MB
IPFS:
,
english, 2003