CISSP Domain 3 Review / Mind Map (6 of 9) | Cryptography
Review of the major Cryptography concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam. Thi...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Review of the major Cryptography concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam.
This MindMap review covers:
0:00 Introduction
0:30 What is Cryptography
1:35 Cryptography Services
1:39 Confidentiality
1:49 Integrity
2:00 Hashing
2:10 Authenticity
2:18 Non-Repudiation
2:43 Access Control
3:00 Plaintext
3:06 Encryption
3:24 Key/Crypto Variable
3:45 Ciphertext
3:54 Cryptographic Terminology Diagram
4:02 Key Clustering
4:26 Work Factor
4:36 Initialization Vector / Nonce
5:07 Confusion
5:25 Diffusion
5:40 Avalanche Effect
6:11 Hidden Secret Writing
6:19 Steganography
6:32 Null Cipher
6:58 Scrambled (Cryptograph) Methods
7:14 One-way Encryption
7:30 Hashing
8:15 Hashing Algorithms
8:24 Two-Way Encryption
8:44 Types of Two-Way Encryption
9:16 Symmetric Algorithms
10:44 Types of Symmetric Algorithms
10:50 Block Ciphers
11:00 Major Symmetric Block Ciphers
12:39 Block Modes
12:55 Electronic Codebook (ECB)
13:12 Counter Mode (CTR)
13:43 Stream Ciphers
14:09 Major Stream Cipher Algorithm
14:30 Asymmetric Algorithms
15:16 Advantages/Disadvantages of Asymmetric Algorithms
16:03 Factoring
16:28 Discrete Logs
18:04 Methods of Converting Plaintext to Cipher Text
18:13 Substitution
18:35 Caesar Cipher
19:20 Polyalphabetic Cipher
19:44 Running Key Cipher
19:54 One-time Pads
20:27 Transposition
20:39 Spartan Scytale
21:08 Rail Fence (ZigZag Cipher)
21:36 Outro
Other MindMaps:
Domain 1
Security & Risk Management: https://youtu.be/geGALIfOxtI
Domain 2
Asset Classification: https://youtu.be/aN9zkmzYTmQ
Privacy: https://youtu.be/lrI4QIa8S2I
Domain 3
Models and Frameworks: https://youtu.be/qZB6_lp9M30
Evaluation Criteria: https://youtu.be/WqHmDL7YAvw
Trusted Computing Base: https://youtu.be/fwU7n_3h058
Vulnerabilities in Systems: https://youtu.be/fPUypU7ysMw
Cloud: https://youtu.be/-rWQ7YuxiLY
Cryptography: https://youtu.be/LLRaa0kOMDM
Digital Certificates, Digital Signatures & PKI: https://youtu.be/8XKdFSG3ua4
Cryptanalysis: https://youtu.be/pnITDgs63M4
Physical Security: https://youtu.be/7ESQwNJ9HXU
Domain 5
Access Control Overview: https://youtu.be/BUcoABZzeQ4
Single Sing-on & Federated Access: https://youtu.be/_U4QMIxVk8M
Domain 6
Security Assessment and Testing Overview: https://youtu.be/eDVZvw5NziA
Vulnerability Assessment and Penetration Testing: https://youtu.be/vZ0S8GdWiIk
Logging & Monitoring: https://youtu.be/cwcARccyWyY
Domain 7
Investigations: https://youtu.be/Urev5cZgny8
Incident Response: https://youtu.be/PwxFwndQ7Jk
Malware: https://youtu.be/SVbrRozyIpo
Patching & Change Management: https://youtu.be/xX4U6Lz82Bk
Recovery Strategies: https://youtu.be/DrrfrJBnx28
Business Continuity Management (BCM): https://youtu.be/oAjNL3I_3-E
Domain 8
Secure Software Development: https://youtu.be/fS5WWjuyFmQ
Databases: https://youtu.be/-70DBd6cNDw
CISSP Master Instructor, John Berti: https://www.linkedin.com/in/jberti/
Visuals, narration and CISSP Master Instructor, Rob Witcher: https://www.linkedin.com/in/robwitcher/
Video editing by Nick: threntinfo@gmail.com
#CISSPDomain3Review #MindMap
Video Information
Views
54.8K
Total views since publication
Likes
1.3K
User likes and reactions
Duration
22:08
Video length
Published
Oct 15, 2020
Release date
Quality
hd
Video definition
Captions
Available
Subtitles enabled
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Crypto variable #Spartan Scytale #Null Cipher #CISSP #Cryptography #One-way encryption #Hashing #MD5 #SHA1 #SHA2 #Two-way encryption #Symmetric Cryptography #Block Ciphers #Stream Ciphers #Asymmetric Cryptography #Elliptic Curve #Substitution #Caesar Cypher #Polyalphabetic #Transposition #Rail Fence #Steganography #Plaintext #Encrypt #Decrypt #Key clustering #Work factor #cISSP Domain 3 Review #cissp domain 3 #cissp training videos #cissp review #cissp training #information security
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.