Understanding Cryptography

This course is included in our On-demand training solution.


To define cryptograhy and identify its use in ensuring the confidentiality, integrity, authenticity, and non-repudiation of information

Target Audience

Candidates who plan to take the International Information Systems Security Certification Consortium’s (ISC)2 Systems Security Certified Practitioner (SSCP) certification exam or IT professionals who want an introduction to the concepts and practices of information system security


The candidate should have at least one year of cumulative experience in one or more of the seven SSCP test domains

Expected Duration

150 min.

Course Objectives

Understanding Cryptography

  • recognize how encryption developed and identify the process and types involved.
  • identify the block cipher modes of operation and the different block cipher algorithims.
  • to identify the role of hashes and digital signatures in protecting the integrity of encrypted data.
  • recognize encryption processes.
  • identify the various methods of key management.
  • identify the features of the general hierarchical model of public key infrastructure and the top-down hierarchical SET public key infrastructure.
  • identify the types and features of encryption protocols.
  • identify various types of cryptographic attack.