CISSP 2018: Cryptographic Client-based Systems


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Gain an advanced knowledge of cryptographic systems, life cycles, techniques, and methodologies. This course introduces you to cryptology and cryptographic systems. It then examines integrity and hashing in relation to cryptography, explores cryptographic methods and techniques, and discusses the nature of cryptanalytic attacks. You will then learn about the phases of the cryptographic life cycle, digital signatures, and the use and function of public key infrastructure (PKI). From there, you will go on to consider key management practices, such as key stretching, pinning, key escrow, and hardware security modules (HSM). Finally, as a review exercise, you will list three types of ciphers, three types of cryptographic hashing, and three different hashing algorithms.

Expected Duration (hours)
0.9

Lesson Objectives

CISSP 2018: Cryptographic Client-based Systems

  • describe cryptology and cryptographic systems
  • define integrity and hashing in relation to cryptography
  • describe various cryptographic methods and techniques
  • identify cryptanalytic attacks
  • compare phases of the cryptographic life cycle
  • define digital signatures
  • describe the use and function of public key infrastructure
  • recall various key management practices
  • describe key aspects of digital rights management
  • describe cryptographic techniques
  • Course Number:
    it_spciss_02_enus

    Expertise Level
    Expert