Designing VPN Security. Student Guide
Cisco Press
Upon completion of this course, you will be able to perform the following tasks:
• Recognize the services offered by cryptography and recommend those services to an organization to address their
specific needs.
• Describe various encryption, hashing, and signing algorithms and select the best algorithm in a design situation.
• Explain the role of key management in cryptography.
• Explain specific guidelines which need to be considered whendeploying cryptographic systems.
• Select the best practices of key management in a design situation.
• Recognize the services offered by cryptography and recommend those services to an organization to address their
specific needs.
• Describe various encryption, hashing, and signing algorithms and select the best algorithm in a design situation.
• Explain the role of key management in cryptography.
• Explain specific guidelines which need to be considered whendeploying cryptographic systems.
• Select the best practices of key management in a design situation.
Kategori:
Tahun:
2003
Edisi:
1.0
Penerbit:
Cisco Press
Bahasa:
english
Halaman:
1050
Fail:
PDF, 8.21 MB
IPFS:
,
english, 2003