Cryptography enables the protection of security assets through the transformation of clear text to unreadable form. Cryptography -- essentially defined as the transformation of clear text into an unreadable form -- is the method used to store and transmit messages safely so that only the intended recipient can read them.
In this CISSP Essentials Security School lesson, Domain 3, Cryptography, featuring noted CISSP certification trainer Shon Harris, learn how cryptography, its components, methods and uses are employed in the enterprise to store and transmit messages safely.
ABOUT CISSP ESSENTIALS
Discover what you need to know to ace the CISSP exam with this series of CISSP certification training lessons. Each lesson, which contains a video, domain spotlight article and a quiz with sample CISSP exam questions, corresponds to a specific domain in the CISSP exam's "Common Body of Knowledge" -- the essential elements each CISSP-certified practitioner must know.
Before watching the special Domain 3, Cryptography video below, it's recommended that students first read the Class 3 Domain Spotlight article, which offers an overview of the history of cryptography and the many complex, imaginative approaches that are used to accomplish this task. Other key topics include background on cryptography's evolution, historical uses and current industry status; cryptographic components and their relationships; and cryptography methods and uses, including keys algorithms, symmetric versus asymmetric approaches, PKI concepts and mechanisms and hashing and uses.
After watching the video, test your comprehension of this material with our Domain 3, Cryptography quiz. Upon completion, return to the CISSP Essentials Security School table of contents to select your next lesson.
About Shon Harris:
Shon Harris is a CISSP, MCSE and President of Logical Security, a firm specializing in security educational and training tools. Logical Security offers curriculum, virtual labs, instructor slides and tools for lease by training companies, security companies, military organizations, government sectors and corporations.
Shon is also a security consultant, an engineer in the Air Force's Information Warfare unit, an entrepreneur and an author. She has authored two best selling CISSP books, including CISSP All-in-One Exam Guide, and was a contributing author to the book Hacker's Challenge. Shon is currently finishing her newest book, Gray Hat Hacking: The Ethical Hacker's Handbook.
CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as ISC(2).