CISSP Essentials

CISSP Essentials training: Domain 3, Cryptography

New for 2014, this lesson in our free CISSP certification training guide covers the history of cryptography and how to apply technologies and concepts to protect enterprise data.

Cryptography enables the protection of security assets through the transformation of clear text to unreadable form. Cryptography -- essentially defined as the transformation of clear text into an unreadable form -- is the method used to store and transmit messages safely so that only the intended recipient can read them.

In this CISSP Essentials Security School lesson, Domain 3, Cryptography, featuring noted CISSP certification trainer Shon Harris, learn how cryptography, its components, methods and uses are employed in the enterprise to store and transmit messages safely.

Domain 3 spotlight article

Familiarize yourself with the cryptography domain with this Domain 3 spotlight article, which offers background and perspective on the history and importance of cryptography, components of a cryptographic system, symmetric vs. asymmetric key algorithms, digital authentication and cryptography protocols.

Domain 3 training video: Cryptography algorithms and encryption keys

In the first of two all-new video tutorials on cryptography, our Domain 3 training video on cryptography algorithms and encryption keys lays out exactly what cryptography is, including its goals, services and functionality within the information security industry along with essential cryptography-related terminology and the elements of a strong cryptosystem. The presentation also offers an in-depth explanation of asymmetric vs. symmetric cryptography and defines a number of cryptography algorithms. 

Domain 3 training video: PKI and digital certificates

In our follow-up Domain 3 training video on PCI and digital certificates, Shon Harris offers an up-close look at the two core tenants of the cryptography domain. Learn how PKI works and why it's so critical to information security, as well as the different components of a PKI, including registration authorities, certificate authorities and digital certificates.

Domain 3 quiz: Cryptography

Finally, after reading the spotlight article and two training videos, test your comprehension of the material with our Domain 3 quiz on cryptography. The 15-question interactive quiz uses a variety of multimedia components to mimic the interactive nature of the new CISSP exam.

Shon HarrisAbout Shon Harris:
Shon Harris is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Force's Information Warfare unit, an instructor and an author. She has authored several international best-selling books on information security published by McGraw-Hill and Pearson which have sold over a million copies and have been translated into six languages. Ms. Harris authors academic textbooks for various publishers and articles for trade magazines. 

Ms. Harris has consulted for a large number of organizations in every business sector (financial, medical, retail, entertainment, utility) and several U.S. government agencies over the last 18 years. Ms. Harris provides high-end, advanced and specialized consulting for organizations globally. She also works directly with law firms as a technical and expert witness on cases that range from patent infringement, criminal investigations, civil lawsuits and she specializes in cryptographic technologies. Ms. Harris was recognized as one of the top 25 women in the information security field by Information Security magazine.

CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as (ISC)2.

This was first published in October 2014

Dig deeper on CISSP Certification

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close