O'Reilly logo
live online training icon Live Online training

CISSP stumbling blocks: Security architecture, engineering, and cryptography

Tackling the most difficult aspects of the CISSP exam

Chad Russell

The CISSP is an industry recognized certification that demonstrates your understanding of the core concepts of information security. Over three hours, Chad Russell helps you tackle the most difficult topics covered in the CISSP exam, focusing on network security architectures, the security capabilities of information systems, and cryptography techniques and technologies.

What you'll learn-and how you can apply it

By the end of this live online course, you’ll understand:

  • The security capabilities of information systems (e.g., memory protection, virtualization, trusted platform module, interfaces, and fault tolerance)
  • Symmetric and asymmetric cryptography concepts
  • Hashing, salting, and crypto attacks
  • PKI and digital signatures

And you’ll be able to:

  • Apply network security architectures
  • Understand and situationally apply cryptography techniques and technologies

This training course is for you because...

  • You're an IT professional looking to advance your career through CISSP certification.
  • You're an IT professional looking to expand your knowledge and understanding of information security.

Prerequisites

  • A basic operational understanding of computer networking and systems
  • Intermediate or greater knowledge in one or more of the eight domains covered by the CISSP exam (a requirement for taking the exam)

Recommended preparation:

Preparation for CISSP Certification, Domains 1–4 (Learning Path)

Preparation for CISSP Certification, Domains 5–8 (Learning Path)

About your instructor

  • Chad Russell is a cyber security veteran of 15 years who has held CISSP, CCNP, MCSE, and MCDBA certifications. Chad has taught Microsoft Engineering courses as a certified trainer, and has acted as a security engineering consultant for companies such as SAP, Microsoft, and Oracle. Currently, Chad conducts security risk assessments for companies throughout North America with an emphasis on cloud security, identity governances, network security, social engineering, mobile security, breach assessments, database security, and access management.

Schedule

The timeframes are only estimates and may vary according to how the class is progressing

CISSP stumbling blocks (30 minutes)

  • Lecture and hands-on exercise: Common obstacles when preparing for the CISSP exam

Security architectures (50 minutes)

  • Lecture and hands-on exercise: Security architectures overview; the security capabilities of information systems (e.g., memory protection, virtualization, trusted platform module, interfaces, fault tolerance)
  • Q&A

Break (10 minutes)

Cryptography (20 minutes)

Lecture and hands-on exercise: Symmetric and asymmetric cryptography

Break (10 minutes)

PKI and digital signatures (30 minutes)

  • Lecture and hands-on exercise: PKI and digital signatures overview and scenarios

Hashing, salting, and crypto attacks (20 minutes)

  • Lecture and hands-on exercise: Hashing, salting, and crypto attacks overview and scenarios

Wrap-up and Q&A (10 minutes)