CISSP Domain 3 Review / Mind Map (6 of 9) | Cryptography

CISSP Domain 3 Review / Mind Map (6 of 9) | Cryptography

54.094 Lượt nghe
CISSP Domain 3 Review / Mind Map (6 of 9) | Cryptography
Review of the major Cryptography concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam. This MindMap review covers: 0:00 Introduction 0:30 What is Cryptography 1:35 Cryptography Services 1:39 Confidentiality 1:49 Integrity 2:00 Hashing 2:10 Authenticity 2:18 Non-Repudiation 2:43 Access Control 3:00 Plaintext 3:06 Encryption 3:24 Key/Crypto Variable 3:45 Ciphertext 3:54 Cryptographic Terminology Diagram 4:02 Key Clustering 4:26 Work Factor 4:36 Initialization Vector / Nonce 5:07 Confusion 5:25 Diffusion 5:40 Avalanche Effect 6:11 Hidden Secret Writing 6:19 Steganography 6:32 Null Cipher 6:58 Scrambled (Cryptograph) Methods 7:14 One-way Encryption 7:30 Hashing 8:15 Hashing Algorithms 8:24 Two-Way Encryption 8:44 Types of Two-Way Encryption 9:16 Symmetric Algorithms 10:44 Types of Symmetric Algorithms 10:50 Block Ciphers 11:00 Major Symmetric Block Ciphers 12:39 Block Modes 12:55 Electronic Codebook (ECB) 13:12 Counter Mode (CTR) 13:43 Stream Ciphers 14:09 Major Stream Cipher Algorithm 14:30 Asymmetric Algorithms 15:16 Advantages/Disadvantages of Asymmetric Algorithms 16:03 Factoring 16:28 Discrete Logs 18:04 Methods of Converting Plaintext to Cipher Text 18:13 Substitution 18:35 Caesar Cipher 19:20 Polyalphabetic Cipher 19:44 Running Key Cipher 19:54 One-time Pads 20:27 Transposition 20:39 Spartan Scytale 21:08 Rail Fence (ZigZag Cipher) 21:36 Outro Other MindMaps: Domain 1 Security & Risk Management: https://youtu.be/geGALIfOxtI Domain 2 Asset Classification: https://youtu.be/aN9zkmzYTmQ Privacy: https://youtu.be/lrI4QIa8S2I Domain 3 Models and Frameworks: https://youtu.be/qZB6_lp9M30 Evaluation Criteria: https://youtu.be/WqHmDL7YAvw Trusted Computing Base: https://youtu.be/fwU7n_3h058 Vulnerabilities in Systems: https://youtu.be/fPUypU7ysMw Cloud: https://youtu.be/-rWQ7YuxiLY Cryptography: https://youtu.be/LLRaa0kOMDM Digital Certificates, Digital Signatures & PKI: https://youtu.be/8XKdFSG3ua4 Cryptanalysis: https://youtu.be/pnITDgs63M4 Physical Security: https://youtu.be/7ESQwNJ9HXU Domain 5 Access Control Overview: https://youtu.be/BUcoABZzeQ4 Single Sing-on & Federated Access: https://youtu.be/_U4QMIxVk8M Domain 6 Security Assessment and Testing Overview: https://youtu.be/eDVZvw5NziA Vulnerability Assessment and Penetration Testing: https://youtu.be/vZ0S8GdWiIk Logging & Monitoring: https://youtu.be/cwcARccyWyY Domain 7 Investigations: https://youtu.be/Urev5cZgny8 Incident Response: https://youtu.be/PwxFwndQ7Jk Malware: https://youtu.be/SVbrRozyIpo Patching & Change Management: https://youtu.be/xX4U6Lz82Bk Recovery Strategies: https://youtu.be/DrrfrJBnx28 Business Continuity Management (BCM): https://youtu.be/oAjNL3I_3-E Domain 8 Secure Software Development: https://youtu.be/fS5WWjuyFmQ Databases: https://youtu.be/-70DBd6cNDw CISSP Master Instructor, John Berti: https://www.linkedin.com/in/jberti/ Visuals, narration and CISSP Master Instructor, Rob Witcher: https://www.linkedin.com/in/robwitcher/ Video editing by Nick: [email protected] #CISSPDomain3Review #MindMap