Overview/Description
To recognize how different cryptographic technologies are used to provide confidentiality, integrity, and authentication for data being transferred across untrusted networks; to prepare candidates for one of the ten knowledge domains assessed in (ISC)2's CISSP certification exam
Target Audience
Mid-level and senior-level managers who are working toward or have already attained positions as CISOs, CSOs or Senior Security Engineers
Prerequisites
A minimum of four years of professional experience in the information security field or three years plus a college degree
CISSP: Cryptography (replaced by course sp_cssp_a04_it_enus)
define key cryptographic terms and distinguish between types of symmetric key algorithms.
distinguish between types of asymmetric algorithms.
determine the appropriate cryptography implementation for a given scenario.
distinguish between types of cipher and identify different categories of cryptanalytic attack.
distinguish between the various algorithms used for message authentication.
determine the appropriate hashing algorithm to use in a given scenario.
recognize how certificate authorities (CAs), digital signatures, and the Public Key Infrastructure (PKI) are used to provide confidentiality, integrity, and authentication.