Securing Data with Encryption

Practice Labs Module
Time
58 minutes
Difficulty
Intermediate

The Securing Data with Encryption module provides you with the instructions and devices to develop your hands on skills in the following topics: Basic OpenSSH 2 client configuration and usage, Role of OpenSSH 2 server host keys, SSH port tunnels, Basic GnuPG management.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Introduction

The Securing Data with Encryption module provides you with the instructions and devices to develop your hands on skills in the following topics:

  • Basic OpenSSH 2 client configuration and usage
  • Role of OpenSSH 2 server host keys
  • SSH port tunnels
  • Basic GnuPG management

Lab time: It will take approximately 1 hour to complete this lab.

Exercise 1 - Securing Data with Encryption

Encryption is one of the most effective and most popular techniques to ensure data security. Plain data is processed with a secret key to produce encrypted data, also known as cipher data. To read encrypted data, you must decrypt the data using the relevant secret key. In this exercise, you will understand how to secure data with encryption.

Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.