CISSP Domain - Cryptography


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course covers the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.

Target Audience
Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Expected Duration (hours)
2.0

Lesson Objectives

CISSP Domain - Cryptography

  • define key cryptographic terms
  • identify the characteristics of quantum cryptography
  • match symmetric key algorithms to their corresponding descriptions
  • distinguish between types of asymmetric algorithms
  • determine the appropriate use for a given message format
  • recognize types of ciphers
  • match types of cryptanalytic attack with their corresponding descriptions
  • distinguish between types of algorithms, message formats, ciphers, and cryptanalytic attacks
  • determine the appropriate cryptography implementation for a given scenario
  • determine the appropriate hash algorithm to use in a given scenario
  • recognize characteristics of message authentication codes
  • identify the characteristics of digital signatures
  • identify guidelines for key management and distribution
  • identify characteristics of the XKMS
  • recognize the appropriate application of the split knowledge method of key management
  • recognize methods of key distribution
  • determine the appropriate hashing algorithm to use in a given scenario
  • evaluate the actions of an individual who is practicing key management
  • recognize examples of key management methods
  • Course Number:
    sp_cssp_a04_it_enus