Security School

CISSP Essentials training: Domain 3, Cryptography

Cryptography enables the protection of security assets through the transformation of clear text to unreadable form. Cryptography -- essentially defined as the transformation of clear text into

    Requires Free Membership to View

an unreadable form -- is the method used to store and transmit messages safely so that only the intended recipient can read them. 

In this CISSP Essentials Security School lesson, Domain 3, Cryptography, featuring noted CISSP certification trainer Shon Harris, learn how cryptography, its components, methods and uses are employed in the enterprise to store and transmit messages safely.

Before watching the special Domain 3, Cryptography video below, it's recommended that students first read the Class 3 Domain Spotlight article, which offers an overview of the history of cryptography and the many complex, imaginative approaches that are used to accomplish this task. Other key topics include background on cryptography's evolution, historical uses and current industry status; cryptographic components and their relationships; and cryptography methods and uses, including keys algorithms, symmetric versus asymmetric approaches, PKI concepts and mechanisms and hashing and uses.


    After watching the video, test your comprehension of this material with our Domain 3, Cryptography quiz. Upon completion, return to the CISSP Essentials Security School table of contents to select your next lesson.

    About Shon Harris:
    Shon Harris is a CISSP, MCSE and President of Logical Security, a firm specializing in security educational and training tools. Logical Security offers curriculum, virtual labs, instructor slides and tools for lease by training companies, security companies, military organizations, government sectors and corporations.

    Shon is also a security consultant, an engineer in the Air Force's Information Warfare unit, an entrepreneur and an author. She has authored two best selling CISSP books, including CISSP All-in-One Exam Guide, and was a contributing author to the book Hacker's Challenge. Shon is currently finishing her newest book, Gray Hat Hacking: The Ethical Hacker's Handbook.

    CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as ISC(2).

    This was first published in September 2008

    There are Comments. Add yours.

    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: