Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

SSCP Cert Prep: 5 Cryptography

Description

Prepare for the Systems Security Certified Practitioner certification (SSCP). Review the objectives from the Cryptography domain of the SSCP exam.

Tags

Syllabus

Syllabus IntroductionProtecting data with cryptography1. EncryptionUnderstanding encryptionSymmetric and asymmetric cryptographyGoals of cryptographyCodes and ciphersChoosing encryption algorithmsThe perfect encryption algorithmThe cryptographic lifecycle2. Symmetric CryptographyData encryption standard3DESAES, Blowfish, and TwofishRC4Steganography3. Asymmetric CryptographyRivest-Shamir-Adleman (RSA)PGP and GnuPGElliptic curve and quantum cryptography4. Key ManagementCryptographic key securityKey exchangeDiffie-HellmanKey escrowKey stretching5. Public Key InfrastructureTrust modelsPKI and digital certificatesHash functionsDigital signaturesCreate a digital certificateRevoke a digital certificateCertificate staplingCertificate authoritiesCertificate subjectsCertificate typesCertificate formats6. Transport EncryptionTLS and SSLIPsecSecuring common protocolsDKIMTor and perfect forward secrecyBlockchain7. Cryptanalytic AttacksBrute-force attacksKnowledge-based attacksLimitations of encryption algorithmsConclusionContinuing your studies Read more


SSCP Cert Prep: 5 Cryptography

Affiliate notice

Prepare for the Systems Security Certified Practitioner certification (SSCP). Review the objectives from the Cryptography domain of the SSCP exam.

Syllabus IntroductionProtecting data with cryptography1. EncryptionUnderstanding encryptionSymmetric and asymmetric cryptographyGoals of cryptographyCodes and ciphersChoosing encryption algorithmsThe perfect encryption algorithmThe cryptographic lifecycle2. Symmetric CryptographyData encryption standard3DESAES, Blowfish, and TwofishRC4Steganography3. Asymmetric CryptographyRivest-Shamir-Adleman (RSA)PGP and GnuPGElliptic curve and quantum cryptography4. Key ManagementCryptographic key securityKey exchangeDiffie-HellmanKey escrowKey stretching5. Public Key InfrastructureTrust modelsPKI and digital certificatesHash functionsDigital signaturesCreate a digital certificateRevoke a digital certificateCertificate staplingCertificate authoritiesCertificate subjectsCertificate typesCertificate formats6. Transport EncryptionTLS and SSLIPsecSecuring common protocolsDKIMTor and perfect forward secrecyBlockchain7. Cryptanalytic AttacksBrute-force attacksKnowledge-based attacksLimitations of encryption algorithmsConclusionContinuing your studies Read more