O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CISSP Video Course Domain 3 – Cryptography

Video Description

The fast, powerful way to prepare for your CISSP exam!

30+ hours of personal video training from leading security expert Shon Harris

Achieving the (ISC)2’s globally recognized CISSP can give your IT career a lift. In this DVD, the world’s #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon’s classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient.

Master the skills and concepts you need for all ten CISSP common body of knowledge domains:

  • Access Control

  • Application Security

  • Business Continuity and Disaster Recovery Planning

  • Cryptography

  • Information Security and Risk Management

  • Legal, Regulations, Compliance, and Investigations

  • Operations Security

  • Physical (Environmental) Security

  • Security Architecture and Design

  • Telecommunications and Network Security

  • System Requirements

    OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
    MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
    COMPUTER: 500MHz or higher CPU; 128MB RAM or more

    Table of Contents

    1. Course Introduction 00:07:24
    2. Domain 3 – Cryptography 00:01:58
    3. Services Provided by Cryptography 00:01:13
    4. Cryptographic Definitions 00:01:15
    5. Cipher 00:01:36
    6. A Few More Definitions 00:02:33
    7. Symmetric Cryptography – Use of Secret Keys 00:01:23
    8. Scytale Cipher 00:01:03
    9. Substitution Ciphers 00:01:55
    10. Simple Substitution Cipher Atbash 00:01:31
    11. Caesar Cipher Example 00:01:47
    12. Simple Substitution Cipher ROT13 00:01:33
    13. Historical Uses 00:02:10
    14. Vigenere Algorithm 00:01:54
    15. Enigma Machine 00:05:45
    16. Historical Uses of Symmetric Cryptography – Running Key and Concealment 00:03:01
    17. Agenda 1 00:00:15
    18. Transposition Ciphers 00:01:15
    19. Key and Algorithm Relationship 00:04:22
    20. Ways of Breaking Cryptosystems – Brute Force 00:01:53
    21. Brute Force Components 00:00:44
    22. Ways of Breaking Cryptosystems – Frequency Analysis 00:01:40
    23. Strength of a Cryptosystem 00:02:17
    24. Developing Cryptographic Solutions In-House 00:01:15
    25. Characteristics of Strong Algorithms 00:02:48
    26. Open or Closed More Secure? 00:01:23
    27. Types of Ciphers Used Today 00:01:48
    28. S-Boxes Used in Block Ciphers 00:01:33
    29. Binary Mathematical Function 1 00:01:25
    30. Type of Symmetric Cipher – Stream Cipher 00:01:43
    31. Symmetric Characteristics 00:00:47
    32. Initialization Vectors 00:01:42
    33. Security Holes 00:05:07
    34. Strength of a Stream Cipher 00:02:32
    35. Out-of-Band Transmission 00:01:57
    36. Symmetric Key Management Issue 00:03:26
    37. Asymmetric Cryptography 00:00:57
    38. Key Functions 00:00:55
    39. Public Key Cryptography Advantages 00:02:53
    40. Asymmetric Algorithm Disadvantages 00:01:14
    41. Confusing Names 00:01:39
    42. Symmetric versus Asymmetric 00:00:59
    43. Questions 1 00:04:29
    44. When to Use Which Key 00:02:23
    45. Encryption Steps 00:02:28
    46. Receiver’s Public Key Is Used to Encrypt the Symmetric Key 00:00:42
    47. Receiver’s Private Key Is Used to Decrypt the Symmetric Key 00:01:16
    48. Digital Envelope 00:01:07
    49. Secret versus Session Keys 00:01:01
    50. Asymmetric Algorithms We Will Dive Into 00:01:29
    51. Diffie-Hellman 00:05:06
    52. Key Agreement Schemes 00:00:49
    53. Asymmetric Algorithm – RSA 00:01:35
    54. Factoring Large Numbers 00:01:57
    55. RSA Operations 00:01:08
    56. RSA Key Size 00:01:01
    57. El Gamal 00:02:42
    58. Asymmetric Mathematics 00:03:34
    59. Asymmetric Security 00:00:46
    60. Mathematics 00:06:55
    61. Block Cipher 00:01:07
    62. Double DES 00:01:36
    63. Evolution of DES 00:00:59
    64. Modes of 3DES 00:01:14
    65. Encryption Modes 00:01:42
    66. Block Cipher Modes – CBC 00:02:29
    67. Different Modes of Block Ciphers – ECB 00:01:29
    68. ECB versus CBC 00:00:31
    69. Block Cipher Modes – CFB and OFB 00:04:06
    70. CFB and OFB Modes 00:01:42
    71. Counter Mode 00:02:47
    72. Modes Summary 00:01:46
    73. Symmetric Ciphers 00:03:44
    74. Data Integrity 00:00:52
    75. Hashing Steps 00:01:06
    76. Protecting the Integrity of Data 00:01:01
    77. Hashing Algorithms 00:02:22
    78. Data Integrity Mechanisms 00:01:23
    79. Hashing Strength 00:00:35
    80. Question 1 00:00:22
    81. Weakness In Using Only Hash Algorithms 00:00:44
    82. More Protection In Data Integrity 00:00:40
    83. MAC 00:01:12
    84. HMAC – Sender 00:01:50
    85. Another Look 00:01:03
    86. What Services 00:01:03
    87. CBC-MAC 00:01:42
    88. MAC Using Block Ciphers 00:00:59
    89. Integrity? 00:01:00
    90. What Services? 00:01:30
    91. Question 2 00:01:26
    92. Digital Signatures 00:02:43
    93. U.S. Government Standard 00:01:04
    94. What Is… 00:00:20
    95. Not Giving Up the Farm 00:00:52
    96. Zero Knowledge Proof 00:01:07
    97. Message Integrity Controls 00:01:01
    98. Security Issues In Hashing 00:01:22
    99. Example of a Birthday Attack 00:03:00
    100. Birthday Attack Issues 00:00:52
    101. Key Management 00:02:50
    102. Key Usage 00:02:13
    103. M-of-N 00:01:47
    104. Key Types 00:01:22
    105. Why Do We Need a PKI? 00:01:17
    106. PKI and Its Components 00:02:51
    107. RA Roles 00:02:29
    108. CA 00:02:10
    109. Digital Certificates 00:02:25
    110. Certificate 00:00:45
    111. Signing the Certificate 00:00:52
    112. Verifying the Certificate 00:03:34
    113. Trusted CA’s 00:01:30
    114. Non-Trusted CA 00:03:29
    115. What Do You Do with a Certificate? 00:05:01
    116. Components of PKI, Repository, and CRLs 00:02:21
    117. Revoked? 00:01:50
    118. CRL Process 00:02:45
    119. Different Uses for Certificates 00:02:12
    120. Cross Certification 00:02:58
    121. PKI and Trust 00:01:41
    122. Historical Uses of Symmetric Cryptography 00:01:31
    123. Binary Mathematical Function 2 00:02:19
    124. One-Time Pad in Action 00:00:45
    125. One-Time Pad Characteristics 00:03:32
    126. Steganography 00:01:57
    127. Digital Watermarking 00:01:11
    128. Link versus End-to-End Encryption 00:03:02
    129. End-to-End Encryption 00:01:28
    130. Encryption Location 00:01:15
    131. Email Standards 00:02:16
    132. You Decide 00:02:40
    133. Non-Hierarchical 00:01:48
    134. Secure Protocols 00:02:18
    135. SSL Connection Setup 00:04:13
    136. Example – SSL 00:01:09
    137. Validating Certificate 00:00:58
    138. Secure Protocols (Cont.) 00:02:16
    139. SSL and the OSI Model 00:01:57
    140. E-Commerce 00:04:15
    141. How Are You Doing? 00:01:28
    142. Secure Email Standard 00:02:05
    143. Network Layer Protection 00:02:58
    144. IPSec Key Management 00:01:48
    145. IPSec Handshaking Process 00:01:00
    146. VPN Establishment 00:01:55
    147. SAs In Use 00:03:04
    148. Key Issues within IPSec 00:01:52
    149. Configuration of SA Parameters 00:00:32
    150. IPSec Configuration Options 00:00:45
    151. IPSec Is a Suite of Protocols 00:03:17
    152. AH and ESP Modes 00:02:13
    153. IPSec Modes of Operation 00:01:14
    154. VPN Establishment (Cont.) 00:02:04
    155. Review 00:02:08
    156. Questions 2 00:02:20
    157. Attack Types 00:00:43
    158. Attacks on Cryptosystems 00:01:23
    159. Known-Plaintext Attack 00:01:53
    160. Chosen-Plaintext Attack 00:01:11
    161. Chosen-Ciphertext Attack 00:02:01
    162. Adaptive Attacks 00:01:00
    163. Side Channel Attacks 00:01:17
    164. Domain 3 Review 00:03:12