O'Reilly logo

The Official (ISC)2 Guide to the SSCP CBK, 4th Edition by Steven Hernandez, Adam Gordon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Domain 5 Cryptography

CRYPTOGRAPHY IS ONE OF the most common and effective tools the security practitioner has to meet the security objectives of an organization. This chapter explains the key foundational concepts the security practitioner will need to understand and apply the fundamental concepts of cryptography.

Topics

The following topics are addressed in this chapter:

  • Fundamental concepts of cryptography
    • Evaluation of algorithms
    • Hashing
    • Salting
    • Symmetric/asymmetric cryptography
    • Digital signatures
    • Non-repudiation
  • Requirements for cryptography
  • Secure protocols
  • Cryptographic systems
    • Fundamental key management concepts
    • Public key infrastructure
    • Administration and validation
    • Web of Trust
    • Implementation of secure protocols

Objectives ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required