110.3 – Securing data with encryption
Weight
4
Description
The candidate should be able to use public key techniques to secure data and communication.
Key Knowledge Areas
-
Perform basic OpenSSH 2 client configuration and usage.
-
Understand the role of OpenSSH 2 server host keys.
-
Perform basic GnuPG configuration, usage and revocation.
-
Use GPG to encrypt, decrypt, sign and verify files.
-
Understand SSH port tunnels (including X11 tunnels).
Files, Terms, and Utilities
-
ssh -
ssh-keygen -
ssh-agent -
ssh-add -
~/.ssh/id_rsaandid_rsa.pub -
~/.ssh/id_dsaandid_dsa.pub -
~/.ssh/id_ecdsaandid_ecdsa.pub -
~/.ssh/id_ed25519andid_ed25519.pub -
/etc/ssh/ssh_host_rsa_keyandssh_host_rsa_key.pub -
/etc/ssh/ssh_host_dsa_keyandssh_host_dsa_key.pub -
/etc/ssh/ssh_host_ecdsa_keyandssh_host_ecdsa_key.pub -
/etc/ssh/ssh_host_ed25519_keyandssh_host_ed25519_key.pub -
~/.ssh/authorized_keys -
ssh_known_hosts -
gpg -
gpg-agent -
~/.gnupg/