CISSP 2013 Domain: Cryptography

Mid- and senior-level managers who are working toward or have already attained positions as CISOs, CSOs, or Senior Security Engineers

Prerequisite
Please contact us for information about prerequisites.

Expected Duration
120 minutes

Description
Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course covers the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: January 1, 2012.

Objective

Cryptographic Terminology and Symmetric Algorithms

  • define key cryptographic terms
  • identify the characteristics of quantum cryptography
  • match symmetric key algorithms to their corresponding descriptions
  • distinguish between types of asymmetric algorithms
  • determine the appropriate use for a given message format
  • recognize types of ciphers
  • match types of cryptanalytic attack with their corresponding descriptions
  • distinguish between types of algorithms, message formats, ciphers, and cryptanalytic attacks
  • determine the appropriate cryptography implementation for a given scenario
  • Message Authentication and Certificate Authority

  • determine the appropriate hash algorithm to use in a given scenario
  • recognize characteristics of message authentication codes
  • identify the characteristics of digital signatures
  • identify guidelines for key management and distribution
  • identify characteristics of the XKMS
  • recognize the appropriate application of the split knowledge method of key management
  • recognize methods of key distribution
  • determine the appropriate hashing algorithm to use in a given scenario
  • evaluate the actions of an individual who is practicing key management
  • recognize examples of key management methods
  • MONTHLY SUBSCRIPTION

    $129/month
     

    ANNUAL SUBSCRIPTION

    $1295/year

    Multi-license discounts available for Annual and Monthly subscriptions.