Topics | Level | Sub topics | Skill Category No | Code Share | comment |
---|---|---|---|---|---|
Security functions and cryptography positioning | I |
Knowing the basic concepts and the big picture of security, knowing the risks in Open Source Software (OSS).
|
7-1-1-I | ||
Cryptography systems/common key cipher systems | II |
Introducing the symmetric key encryption, knowing its basic concepts, features, advantages and disadvantages, understanding its mechanisms Prerequisite:
|
7-1-2-II |
|
|
Cryptography Toolkits | III |
Knowing the typical cryptography toolkits, understanding the usage of them.
|
7-1-3-III |
|
|
Cryptography systems/public key cipher systems | II |
Introducing the public key encryption, knowing its basic concepts, features, advantages and disadvantages, understanding its mechanisms. Prerequisite:
|
7-1-3-II |
|
|
Cryptography application systems in information systems | II |
Understanding the cryptography application systems in information systems, including the database encryption, file encryption, etc.
|
7-1-4-II |
|
|
Digital signature | II |
Understanding the digital signature mechanisms, understanding the features and usage of typical digital signatures.
|
7-1-5-II |
|
|
OSS utilization scenes | II |
Knowing the necessity of cryptography in different OSS application scenes. Knowing the implementation of encryption processing with OSS at the OS, middleware, and application levels.
|
7-1-6-II |
|
|
Cryptography usage in Wireless LAN | II |
Introducing the cryptography usage in WLAN, knowing its necessity, features, advantages and disadvantages. Knowing the implementation of wireless networks encryption.
|
7-1-7-II |
|
|
Authentication | I |
Knowing the basic mechanism and implementation method. Understanding practical methods to achieve a proper authentication system.
|
7-1-8-I |
|
|
Authentication | II |
Knowing the basic mechanism and implementation method. Understanding practical methods to achieve a proper authentication system.
|
7-1-8-II |
|
|
Encrypted communications using IPSec | I |
Introducing IPSec, knowing its architecture and operation modes, understanding the algorithms and implementation.
|
7-1-9-I |
|
|
Encrypted communications using IPSec | II |
Introducing IPSec, knowing its architecture and operation modes, understanding the algorithms and implementation.
|
7-1-9-II | ||
SSH | II |
Introducing Secure Shell (SSH), knowing its outline, specifications and features, understanding the usage of SSH.
|
7-1-10-II |
|
|
SSL/TLS | II |
Introducing Secure Socket Layer (SSL), knowing its outline, specifications, and features, understanding related applications
|
7-1-11-II |
|
|
VPN communications | III |
Understanding the functions and mechanism of VPN.
|
7-1-12-III |
|
|
The mechanism of PKI (public key encryption infrastructure) | III |
Knowing the purpose, role, and fields of application of Public Key Infrastructure (PKI), understanding the mechanism and the implementation of it.
|
7-1-13-III |
|
|
PGP | III |
Understanding the mechanism and usage of PGP.
|
7-1-14-III |
|
Recent comments
2 years 21 weeks ago
9 years 47 weeks ago
9 years 47 weeks ago
9 years 47 weeks ago
10 years 5 weeks ago
10 years 5 weeks ago
10 years 5 weeks ago
10 years 5 weeks ago
10 years 5 weeks ago
10 years 5 weeks ago