SSCP Domain: Cryptography

Target Audience
Expected Duration
Lesson Objectives
Course Number

In modern business and IT, keeping information secure and/or proving from where it originated can be key aspects of success. Cryptography provides the tools necessary to guarantee confidentiality and authenticity in the digital age. This course provides the learner with an understanding of the applications of symmetric and public key cryptography and when they are required as well as concepts such as key management and secure ciphers and protocols. The course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Target Audience
Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year's professional experience in one of the seven SSCP CBK Domains is required for certification.

Expected Duration (hours)

Lesson Objectives

SSCP Domain: Cryptography

  • define the principal cryptographic terms
  • describe the classic modes of operation for block ciphers
  • describe newer standardized modes of operation for block ciphers
  • identify appropriate uses for stream ciphers and one time pads
  • recognize characteristics of digital signatures
  • describe how to implement a public key infrastructure
  • identify the components of a public key infrastructure
  • determine the most appropriate mode of operation to employ in a particular scenario
  • implement a Public Key Infrastructure for a particular scenario
  • describe types of cryptographic attacks
  • recognize how cryptographic algorithms are used
  • determine the most appropriate hash algorithm to use
  • distinguish between types of secure protocol
  • recognize specific cryptographic attacks
  • determine the most appropriate cryptographic functions to use in a particular scenario
  • Course Number: