O'Reilly logo

Authorized Self-Study Guide Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) by CCSI, CCVP Chris Olsen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Image

Chapter 14 Understanding Cryptographic Fundamentals and PKI

CUCM supports several security features that are based on cryptographic services. Some of these features use a Public Key Infrastructure (PKI). When implementing security features in CUCM, it is important to understand the underlying security services, algorithms, and concepts. This chapter provides information about cryptographic fundamentals and discusses the concept of a PKI.

Chapter Objectives

Upon completing this chapter, you will be able to describe how cryptographic services are provided and what role a PKI has within a security implementation. You will be able to meet these ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required