CISSP 2024: Cryptographic Solutions & Cryptanalytic Attacks
CISSP 2024
| Expert
- 12 videos | 48m 3s
- Includes Assessment
- Earns a Badge
Cryptology is the science of securing all communications. Cryptography generates messages with hidden meaning whereas cryptanalysis is the science of breaking those encrypted messages to recover their meaning. In this course, we will begin by defining several cryptographic methods such as symmetric, asymmetric, elliptic curves, and quantum and explore the cryptographic life cycle. Next, we will compare key management practices like generation and rotation and look at digital signatures and digital certificates for non-repudiation and integrity. We will then explore public key infrastructure (PKI), including quantum key distribution, and compare several types of brute force attacks. Finally, we will delve into implementation attacks, side-channel attacks, Kerberos exploitation, and ransomware attacks. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine cryptographic methods such as symmetric, asymmetric, elliptic curves, and quantumOutline the cryptographic life cycle including keys and algorithm selectionCompare key management practices like generation and rotationOutline digital signatures and digital certificates for non-repudiation and integrityOutline the use of public key infrastructure (pki) including quantum key distribution
-
Compare brute force attacks and ciphertext only, known plaintext, frequency analysis, and chosen ciphertextOutline implementation and side-channel attacks, including fault injection and timing attacksOutline on-path attacks, also called man-in-the-middle (mitm) and pass the hashOutline methods of exploiting kerberosProvide an overview of ransomware attacksSummarize the key concepts covered in this course
IN THIS COURSE
-
44sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 58sAfter completing this video, you will be able to define cryptographic methods such as symmetric, asymmetric, elliptic curves, and quantum. FREE ACCESS
-
7m 52sUpon completion of this video, you will be able to outline the cryptographic life cycle including keys and algorithm selection. FREE ACCESS
-
3m 14sAfter completing this video, you will be able to compare key management practices like generation and rotation. FREE ACCESS
-
5m 16sUpon completion of this video, you will be able to outline digital signatures and digital certificates for non-repudiation and integrity. FREE ACCESS
-
6m 44sAfter completing this video, you will be able to outline the use of public key infrastructure (PKI) including quantum key distribution. FREE ACCESS
-
4m 18sIn this video, we will compare brute force attacks and ciphertext only, known plaintext, frequency analysis, and chosen ciphertext. FREE ACCESS
-
2m 2sUpon completion of this video, you will be able to outline implementation and side-channel attacks, including fault injection and timing attacks. FREE ACCESS
-
2m 50sAfter completing this video, you will be able to outline on-path attacks, also called man-in-the-middle (MITM) and pass the hash. FREE ACCESS
-
4m 3sUpon completion of this video, you will be able to outline methods of exploiting Kerberos. FREE ACCESS
-
2m 24sAfter completing this video, you will be able to provide an overview of ransomware attacks. FREE ACCESS
-
40sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.