CISSP Video Course Domain 3 - Cryptography

Video description

The fast, powerful way to prepare for your CISSP exam!

30+ hours of personal video training from leading security expert Shon Harris

Achieving the (ISC)2’s globally recognized CISSP can give your IT career a lift. In this DVD, the world’s #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon’s classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient.

Master the skills and concepts you need for all ten CISSP common body of knowledge domains:

  • Access Control

  • Application Security

  • Business Continuity and Disaster Recovery Planning

  • Cryptography

  • Information Security and Risk Management

  • Legal, Regulations, Compliance, and Investigations

  • Operations Security

  • Physical (Environmental) Security

  • Security Architecture and Design

  • Telecommunications and Network Security

  • System Requirements

    OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
    MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
    COMPUTER: 500MHz or higher CPU; 128MB RAM or more

    Table of contents

    1. Course Introduction
    2. Domain 3 -- Cryptography
    3. Services Provided by Cryptography
    4. Cryptographic Definitions
    5. Cipher
    6. A Few More Definitions
    7. Symmetric Cryptography -- Use of Secret Keys
    8. Scytale Cipher
    9. Substitution Ciphers
    10. Simple Substitution Cipher Atbash
    11. Caesar Cipher Example
    12. Simple Substitution Cipher ROT13
    13. Historical Uses
    14. Vigenere Algorithm
    15. Enigma Machine
    16. Historical Uses of Symmetric Cryptography -- Running Key and Concealment
    17. Agenda 1
    18. Transposition Ciphers
    19. Key and Algorithm Relationship
    20. Ways of Breaking Cryptosystems -- Brute Force
    21. Brute Force Components
    22. Ways of Breaking Cryptosystems -- Frequency Analysis
    23. Strength of a Cryptosystem
    24. Developing Cryptographic Solutions In-House
    25. Characteristics of Strong Algorithms
    26. Open or Closed More Secure?
    27. Types of Ciphers Used Today
    28. S-Boxes Used in Block Ciphers
    29. Binary Mathematical Function 1
    30. Type of Symmetric Cipher -- Stream Cipher
    31. Symmetric Characteristics
    32. Initialization Vectors
    33. Security Holes
    34. Strength of a Stream Cipher
    35. Out-of-Band Transmission
    36. Symmetric Key Management Issue
    37. Asymmetric Cryptography
    38. Key Functions
    39. Public Key Cryptography Advantages
    40. Asymmetric Algorithm Disadvantages
    41. Confusing Names
    42. Symmetric versus Asymmetric
    43. Questions 1
    44. When to Use Which Key
    45. Encryption Steps
    46. Receiver's Public Key Is Used to Encrypt the Symmetric Key
    47. Receiver's Private Key Is Used to Decrypt the Symmetric Key
    48. Digital Envelope
    49. Secret versus Session Keys
    50. Asymmetric Algorithms We Will Dive Into
    51. Diffie-Hellman
    52. Key Agreement Schemes
    53. Asymmetric Algorithm -- RSA
    54. Factoring Large Numbers
    55. RSA Operations
    56. RSA Key Size
    57. El Gamal
    58. Asymmetric Mathematics
    59. Asymmetric Security
    60. Mathematics
    61. Block Cipher
    62. Double DES
    63. Evolution of DES
    64. Modes of 3DES
    65. Encryption Modes
    66. Block Cipher Modes -- CBC
    67. Different Modes of Block Ciphers -- ECB
    68. ECB versus CBC
    69. Block Cipher Modes -- CFB and OFB
    70. CFB and OFB Modes
    71. Counter Mode
    72. Modes Summary
    73. Symmetric Ciphers
    74. Data Integrity
    75. Hashing Steps
    76. Protecting the Integrity of Data
    77. Hashing Algorithms
    78. Data Integrity Mechanisms
    79. Hashing Strength
    80. Question 1
    81. Weakness In Using Only Hash Algorithms
    82. More Protection In Data Integrity
    83. MAC
    84. HMAC -- Sender
    85. Another Look
    86. What Services
    87. CBC-MAC
    88. MAC Using Block Ciphers
    89. Integrity?
    90. What Services?
    91. Question 2
    92. Digital Signatures
    93. U.S. Government Standard
    94. What Is...
    95. Not Giving Up the Farm
    96. Zero Knowledge Proof
    97. Message Integrity Controls
    98. Security Issues In Hashing
    99. Example of a Birthday Attack
    100. Birthday Attack Issues
    101. Key Management
    102. Key Usage
    103. M-of-N
    104. Key Types
    105. Why Do We Need a PKI?
    106. PKI and Its Components
    107. RA Roles
    108. CA
    109. Digital Certificates
    110. Certificate
    111. Signing the Certificate
    112. Verifying the Certificate
    113. Trusted CA's
    114. Non-Trusted CA
    115. What Do You Do with a Certificate?
    116. Components of PKI, Repository, and CRLs
    117. Revoked?
    118. CRL Process
    119. Different Uses for Certificates
    120. Cross Certification
    121. PKI and Trust
    122. Historical Uses of Symmetric Cryptography
    123. Binary Mathematical Function 2
    124. One-Time Pad in Action
    125. One-Time Pad Characteristics
    126. Steganography
    127. Digital Watermarking
    128. Link versus End-to-End Encryption
    129. End-to-End Encryption
    130. Encryption Location
    131. Email Standards
    132. You Decide
    133. Non-Hierarchical
    134. Secure Protocols
    135. SSL Connection Setup
    136. Example -- SSL
    137. Validating Certificate
    138. Secure Protocols (Cont.)
    139. SSL and the OSI Model
    140. E-Commerce
    141. How Are You Doing?
    142. Secure Email Standard
    143. Network Layer Protection
    144. IPSec Key Management
    145. IPSec Handshaking Process
    146. VPN Establishment
    147. SAs In Use
    148. Key Issues within IPSec
    149. Configuration of SA Parameters
    150. IPSec Configuration Options
    151. IPSec Is a Suite of Protocols
    152. AH and ESP Modes
    153. IPSec Modes of Operation
    154. VPN Establishment (Cont.)
    155. Review
    156. Questions 2
    157. Attack Types
    158. Attacks on Cryptosystems
    159. Known-Plaintext Attack
    160. Chosen-Plaintext Attack
    161. Chosen-Ciphertext Attack
    162. Adaptive Attacks
    163. Side Channel Attacks
    164. Domain 3 Review

    Product information

    • Title: CISSP Video Course Domain 3 - Cryptography
    • Author(s):
    • Release date: May 2009
    • Publisher(s): Pearson IT Certification
    • ISBN: 9780789740151