5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Collections     Essentials     Security     Certified Information Systems Security Professional (CISSP) 2018
Gain an advanced knowledge of cryptographic systems, life cycles, techniques, and methodologies. This course introduces you to cryptology and cryptographic systems. It then examines integrity and hashing in relation to cryptography, explores cryptographic methods and techniques, and discusses the nature of cryptanalytic attacks. You will then learn about the phases of the cryptographic life cycle, digital signatures, and the use and function of public key infrastructure (PKI). From there, you will go on to consider key management practices, such as key stretching, pinning, key escrow, and hardware security modules (HSM). Finally, as a review exercise, you will list three types of ciphers, three types of cryptographic hashing, and three different hashing algorithms.

Objectives

CISSP 2018: Cryptographic Client-based Systems

  • describe cryptology and cryptographic systems
  • define integrity and hashing in relation to cryptography
  • describe various cryptographic methods and techniques
  • identify cryptanalytic attacks
  • compare phases of the cryptographic life cycle
  • define digital signatures
  • describe the use and function of public key infrastructure
  • recall various key management practices
  • describe key aspects of digital rights management
  • describe cryptographic techniques