Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course covers the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
- Define key cryptographic terms
- Identify the characteristics of quantum cryptography
- Match symmetric key algorithms to their corresponding descriptions
- Distinguish between types of asymmetric algorithms
- Determine the appropriate use for a given message format
- Recognize types of ciphers
- Match types of cryptanalytic attack with their corresponding descriptions
- Distinguish between types of algorithms, message formats, ciphers, and cryptanalytic attacks
- Determine the appropriate cryptography implementation for a given scenario
- Determine the appropriate hash algorithm to use in a given scenario
- Recognize characteristics of message authentication codes
- Identify the characteristics of digital signatures
- Identify guidelines for key management and distribution
- Identify characteristics of the XKMS
- Recognize the appropriate application of the split knowledge method of key management
- Recognize methods of key distribution
- Determine the appropriate hashing algorithm to use in a given scenario
- Evaluate the actions of an individual who is practicing key management
- Recognize examples of key management methods
Studied or Worked here? Share Your Review
Please do not post:
Thank you once again for doing your part to keep Edarabia the most trusted education source.