Cryptography enables the protection of security assets through the transformation of clear text to unreadable form. Cryptography -- essentially defined as the transformation of clear text into
In this CISSP Essentials Security School lesson, Domain 3, Cryptography, featuring noted CISSP certification trainer Shon Harris, learn how cryptography, its components, methods and uses are employed in the enterprise to store and transmit messages safely.
Before watching the special Domain 3, Cryptography video below, it's recommended that students first read the Class 3 Domain Spotlight article, which offers an overview of the history of cryptography and the many complex, imaginative approaches that are used to accomplish this task. Other key topics include background on cryptography's evolution, historical uses and current industry status; cryptographic components and their relationships; and cryptography methods and uses, including keys algorithms, symmetric versus asymmetric approaches, PKI concepts and mechanisms and hashing and uses.
After watching the video, test your comprehension of this material with our Domain 3, Cryptography quiz. Upon completion, return to the CISSP Essentials Security School table of contents to select your next lesson.
About Shon Harris:
Shon Harris is a CISSP, MCSE and President of Logical Security, a firm specializing in security educational and training tools. Logical Security offers curriculum, virtual labs, instructor slides and tools for lease by training companies, security companies, military organizations, government sectors and corporations.
Shon is also a security consultant, an engineer in the Air Force's Information Warfare unit, an entrepreneur and an author. She has authored two best selling CISSP books, including CISSP All-in-One Exam Guide, and was a contributing author to the book Hacker's Challenge. Shon is currently finishing her newest book, Gray Hat Hacking: The Ethical Hacker's Handbook.
CISSP® is a registered certification mark of the International Information Systems Security Certification Consortium, Inc., also known as ISC(2).
This was first published in September 2008