CISSP stumbling blocks: Security architecture, engineering, and cryptography
Tackling the most difficult aspects of the CISSP exam
The CISSP is an industry recognized certification that demonstrates your understanding of the core concepts of information security. Over three hours, Chad Russell helps you tackle the most difficult topics covered in the CISSP exam, focusing on network security architectures, the security capabilities of information systems, and cryptography techniques and technologies.
What you'll learn-and how you can apply it
By the end of this live online course, you’ll understand:
- The security capabilities of information systems (e.g., memory protection, virtualization, trusted platform module, interfaces, and fault tolerance)
- Symmetric and asymmetric cryptography concepts
- Hashing, salting, and crypto attacks
- PKI and digital signatures
And you’ll be able to:
- Apply network security architectures
- Understand and situationally apply cryptography techniques and technologies
This training course is for you because...
- You're an IT professional looking to advance your career through CISSP certification.
- You're an IT professional looking to expand your knowledge and understanding of information security.
- A basic operational understanding of computer networking and systems
- Intermediate or greater knowledge in one or more of the eight domains covered by the CISSP exam (a requirement for taking the exam)
Preparation for CISSP Certification, Domains 1–4 (Learning Path)
Preparation for CISSP Certification, Domains 5–8 (Learning Path)
About your instructor
Chad Russell is a cyber security veteran of 15 years who has held CISSP, CCNP, MCSE, and MCDBA certifications. Chad has taught Microsoft Engineering courses as a certified trainer, and has acted as a security engineering consultant for companies such as SAP, Microsoft, and Oracle. Currently, Chad conducts security risk assessments for companies throughout North America with an emphasis on cloud security, identity governances, network security, social engineering, mobile security, breach assessments, database security, and access management.
The timeframes are only estimates and may vary according to how the class is progressing
CISSP stumbling blocks (30 minutes)
- Lecture and hands-on exercise: Common obstacles when preparing for the CISSP exam
Security architectures (50 minutes)
- Lecture and hands-on exercise: Security architectures overview; the security capabilities of information systems (e.g., memory protection, virtualization, trusted platform module, interfaces, fault tolerance)
Break (10 minutes)
Cryptography (20 minutes)
Lecture and hands-on exercise: Symmetric and asymmetric cryptography
Break (10 minutes)
PKI and digital signatures (30 minutes)
- Lecture and hands-on exercise: PKI and digital signatures overview and scenarios
Hashing, salting, and crypto attacks (20 minutes)
- Lecture and hands-on exercise: Hashing, salting, and crypto attacks overview and scenarios
Wrap-up and Q&A (10 minutes)