CISSP 2024: Cryptographic Solutions & Cryptanalytic Attacks

CISSP 2024    |    Expert
  • 12 videos | 48m 3s
  • Includes Assessment
  • Earns a Badge
Rating 3.0 of 1 users Rating 3.0 of 1 users (1)
Cryptology is the science of securing all communications. Cryptography generates messages with hidden meaning whereas cryptanalysis is the science of breaking those encrypted messages to recover their meaning. In this course, we will begin by defining several cryptographic methods such as symmetric, asymmetric, elliptic curves, and quantum and explore the cryptographic life cycle. Next, we will compare key management practices like generation and rotation and look at digital signatures and digital certificates for non-repudiation and integrity. We will then explore public key infrastructure (PKI), including quantum key distribution, and compare several types of brute force attacks. Finally, we will delve into implementation attacks, side-channel attacks, Kerberos exploitation, and ransomware attacks. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define cryptographic methods such as symmetric, asymmetric, elliptic curves, and quantum
    Outline the cryptographic life cycle including keys and algorithm selection
    Compare key management practices like generation and rotation
    Outline digital signatures and digital certificates for non-repudiation and integrity
    Outline the use of public key infrastructure (pki) including quantum key distribution
  • Compare brute force attacks and ciphertext only, known plaintext, frequency analysis, and chosen ciphertext
    Outline implementation and side-channel attacks, including fault injection and timing attacks
    Outline on-path attacks, also called man-in-the-middle (mitm) and pass the hash
    Outline methods of exploiting kerberos
    Provide an overview of ransomware attacks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 44s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 58s
    After completing this video, you will be able to define cryptographic methods such as symmetric, asymmetric, elliptic curves, and quantum. FREE ACCESS
  • Locked
    3.  Cryptographic Life Cycle
    7m 52s
    Upon completion of this video, you will be able to outline the cryptographic life cycle including keys and algorithm selection. FREE ACCESS
  • Locked
    4.  Key Management Practices
    3m 14s
    After completing this video, you will be able to compare key management practices like generation and rotation. FREE ACCESS
  • Locked
    5.  Digital Signatures and Certificates
    5m 16s
    Upon completion of this video, you will be able to outline digital signatures and digital certificates for non-repudiation and integrity. FREE ACCESS
  • Locked
    6.  Public Key Infrastructure
    6m 44s
    After completing this video, you will be able to outline the use of public key infrastructure (PKI) including quantum key distribution. FREE ACCESS
  • Locked
    7.  Exploring Brute Force Attacks
    4m 18s
    In this video, we will compare brute force attacks and ciphertext only, known plaintext, frequency analysis, and chosen ciphertext. FREE ACCESS
  • Locked
    8.  Implementation and Side-channel Attacks
    2m 2s
    Upon completion of this video, you will be able to outline implementation and side-channel attacks, including fault injection and timing attacks. FREE ACCESS
  • Locked
    9.  On-path Attacks
    2m 50s
    After completing this video, you will be able to outline on-path attacks, also called man-in-the-middle (MITM) and pass the hash. FREE ACCESS
  • Locked
    10.  Kerberos Exploitation
    4m 3s
    Upon completion of this video, you will be able to outline methods of exploiting Kerberos. FREE ACCESS
  • Locked
    11.  Ransomware Attacks
    2m 24s
    After completing this video, you will be able to provide an overview of ransomware attacks. FREE ACCESS
  • Locked
    12.  Course Summary
    40s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.3 of 20 users Rating 4.3 of 20 users (20)