CISSP Essentials training: Domain 3, Cryptography

This lesson in our free CISSP certification training guide covers the history of cryptography and how to apply technologies and concepts to protect enterprise data.

Cryptography enables the protection of security assets through the transformation of clear text to unreadable form.

Cryptography -- essentially defined as the transformation of clear text into an unreadable form -- is the method used to store and transmit messages safely so that only the intended recipient can read them. 

In this CISSP Essentials Security School lesson, Domain 3, Cryptography, featuring noted CISSP certification trainer Shon Harris, learn how cryptography, its components, methods and uses are employed in the enterprise to store and transmit messages safely.

Before watching the special Domain 3, Cryptography video below, it's recommended that students first read the Class 3 Domain Spotlight article, which offers an overview of the history of cryptography and the many complex, imaginative approaches that are used to accomplish this task. Other key topics include background on cryptography's evolution, historical uses and current industry status; cryptographic components and their relationships; and cryptography methods and uses, including keys algorithms, symmetric versus asymmetric approaches, PKI concepts and mechanisms and hashing and uses.

     

    After watching the video, test your comprehension of this material with our Domain 3, Cryptography quiz. Upon completion, return to the CISSP Essentials Security School table of contents to select your next lesson.

    About Shon Harris:
    Shon HarrisShon Harris is a CISSP, MCSE and President of Logical Security, a firm specializing in security educational and training tools. Logical Security offers curriculum, virtual labs, instructor slides and tools for lease by training companies, security companies, military organizations, government sectors and corporations.

    Shon is also a security consultant, an engineer in the Air Force's Information Warfare unit, an entrepreneur and an author. She has authored two best selling CISSP books, including CISSP All-in-One Exam Guide, and was a contributing author to the book Hacker's Challenge. Shon is currently finishing her newest book, Gray Hat Hacking: The Ethical Hacker's Handbook.

    CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as ISC(2).

    This was first published in September 2008

    Dig deeper on CISSP Certification

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    4 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close