CISSP Domain 3 Preview | Attacks on our Cryptography - Part 2

There are a wide variety of ways attackers can try to gain access to our data. One of the easiest and non-technical approaches is social engineering. Subscri...

ThorTeaches.com: CISSP, CC, CISM, GenAI trainingโ€ข468 viewsโ€ข6:34

๐Ÿ”ฅ Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Thailand under the topic 'เธชเธ เธฒเธžเธญเธฒเธเธฒเธจ'.

About this video

There are a wide variety of ways attackers can try to gain access to our data. One of the easiest and non-technical approaches is social engineering. Subscribe to my channel: https://www.youtube.com/@thorteaches/videos?sub_confirmation=1 โœ… ๐—๐—ผ๐—ถ๐—ป ๐—ผ๐˜‚๐—ฟ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ, ๐—–๐—œ๐—ฆ๐— , ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐˜๐—ถ๐—ฒ๐˜€: ๐Ÿ‘‰ ๐—๐—ผ๐—ถ๐—ป ๐—ข๐˜‚๐—ฟ ๐—™๐—ฎ๐—ฐ๐—ฒ๐—ฏ๐—ผ๐—ผ๐—ธ ๐—ฆ๐˜๐˜‚๐—ฑ๐˜† ๐—š๐—ฟ๐—ผ๐˜‚๐—ฝ: https://www.facebook.com/groups/ThorTeaches ๐Ÿ‘‰ ๐—๐—ผ๐—ถ๐—ป ๐—ข๐˜‚๐—ฟ ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐—ฟ๐—ฑ ๐—ฆ๐˜๐˜‚๐—ฑ๐˜† ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ: https://discord.com/invite/GT8fr3Q โœ… ๐—–๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜ ๐˜„๐—ถ๐˜๐—ต ๐—บ๐—ฒ: ๐Ÿ‘‰ Connect with Me on LinkedIn: https://www.linkedin.com/in/thorpedersen/ ๐Ÿ‘‰ Connect with Me on Facebook: https://www.facebook.com/ThorPedersen0 โœ… ๐—”๐—ฏ๐—ผ๐˜‚๐˜ ๐—บ๐˜† ๐—ฐ๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐˜€: ๐Ÿ‘‰ ๐—š๐—ฒ๐˜ ๐—บ๐˜† ๐—–๐—ผ๐—บ๐—ฝ๐—น๐—ฒ๐˜๐—ฒ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ, ๐—–๐—œ๐—ฆ๐— , ๐—ฎ๐—ป๐—ฑ ๐—–๐—– ๐—ฏ๐˜‚๐—ป๐—ฑ๐—น๐—ฒ๐˜€ โžก๏ธ https://thorteaches.com/ ๐Ÿ‘‰ ๐—–๐—ผ๐—บ๐—ฝ๐—ฎ๐—ฟ๐—ฒ ๐˜„๐—ต๐—ฎ๐˜ ๐˜†๐—ผ๐˜‚ ๐—ด๐—ฒ๐˜ ๐—ผ๐—ป ๐—ง๐—ต๐—ผ๐—ฟ๐—ง๐—ฒ๐—ฎ๐—ฐ๐—ต๐—ฒ๐˜€.๐—ฐ๐—ผ๐—บ ๐˜ƒ๐˜€. ๐—จ๐—ฑ๐—ฒ๐—บ๐˜† โžก๏ธ https://thorteaches.com/vs/ ๐Ÿ‘‰ ๐—š๐—ฒ๐˜ ๐—บ๐˜† ๐—ฐ๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐˜€ ๐—ผ๐—ป ๐—จ๐—ฑ๐—ฒ๐—บ๐˜† (Less questions, no flashcards, no glossary, no chatbot)โžก๏ธ https://thorteaches.com/udemy/ โœจThe CISSP is ๐˜๐—ต๐—ฒ ๐—š๐—ข๐—Ÿ๐—— ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐—ฎ๐—ฟ๐—ฑ of IT and Cybersecurity certifications. โœจCISSPs in North America, on average, ๐—บ๐—ฎ๐—ธ๐—ฒ $๐Ÿญ๐Ÿฐ๐Ÿณ,๐Ÿณ๐Ÿฑ๐Ÿณ ๐—ฎ ๐˜†๐—ฒ๐—ฎ๐—ฟ, and globally it is $119,571. Certified individuals make, on average, 35% more than their non-certified colleagues. (source: ISC2) โœจThere are over ๐Ÿณ๐Ÿฐ,๐Ÿฌ๐Ÿฌ๐Ÿฌ ๐—ผ๐—ฝ๐—ฒ๐—ป ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ท๐—ผ๐—ฏ๐˜€ in the US. (source: CyberSeek) โœจWe have 5.5 million filled Cybersecurity jobs worldwide and a 4.8 million workforce gap. Jobs grew 8.7% last year (440,000 jobs). (source ISC2) ๐Ÿ‘จโ€๐Ÿ‘ฉโ€๐Ÿ‘งโ€๐Ÿ‘ฆ ๐Ÿฏ๐Ÿด๐Ÿฌ,๐Ÿฌ๐Ÿฌ๐Ÿฌ+ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—˜๐—ป๐—ฟ๐—ผ๐—น๐—น๐—บ๐—ฒ๐—ป๐˜๐˜€ โญ๐Ÿฐ.๐Ÿณ ๐—ฅ๐—ฎ๐˜๐—ถ๐—ป๐—ด โœ… ๐—™๐˜‚๐—น๐—น๐˜† ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ ๐—˜๐˜…๐—ฎ๐—บ ๐—จ๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ๐—ฑ ๐Ÿ›’ https://cart.thorteaches.com/cissp/ ๐—ง๐—ผ ๐—ฝ๐—ฎ๐˜€๐˜€ ๐˜†๐—ผ๐˜‚๐—ฟ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ฒ๐˜…๐—ฎ๐—บ ๐˜†๐—ผ๐˜‚ ๐—ป๐—ฒ๐—ฒ๐—ฑ ๐˜๐—ต๐—ฒ ๐—ธ๐—ป๐—ผ๐˜„๐—น๐—ฒ๐—ฑ๐—ด๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐˜๐—ต๐—ฒ ๐—ฟ๐—ถ๐—ด๐—ต๐˜ ๐—ฎ๐—ฝ๐—ฝ๐—ฟ๐—ผ๐—ฎ๐—ฐ๐—ต. ๐—œ ๐˜๐—ฒ๐—ฎ๐—ฐ๐—ต ๐˜†๐—ผ๐˜‚ ๐—ฎ๐—น๐—น ๐—ผ๐—ณ ๐—ถ๐˜ ๐—ถ๐—ป ๐—บ๐˜† ๐—ผ๐—ป-๐—ฑ๐—ฒ๐—บ๐—ฎ๐—ป๐—ฑ ๐—–๐—ผ๐—บ๐—ฝ๐—น๐—ฒ๐˜๐—ฒ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ฐ๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ, ๐˜„๐—ต๐—ฒ๐—ฟ๐—ฒ ๐˜†๐—ผ๐˜‚ ๐—ด๐—ฒ๐˜: โ–ถ๏ธ 34 hours of ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐˜ƒ๐—ถ๐—ฑ๐—ฒ๐—ผ๐˜€ ๐Ÿ“ 5000+ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—พ๐˜‚๐—ฒ๐˜€๐˜๐—ถ๐—ผ๐—ป๐˜€, including: ๐Ÿ“ 625 Hard CISSP questions ๐Ÿ“ 750 Complex CISSP questions ๐Ÿ“ 3,250 Easy/Mid CISSP questions โ˜… Both as exam emulation and domain tests. ๐Ÿ“ 201 topic questions โ˜… 3 after each major topic ๐Ÿ“ 240 Domain practice questions โ˜… 30 after each domain ๐Ÿ“‡ 2,500 ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ณ๐—น๐—ฎ๐˜€๐—ต๐—ฐ๐—ฎ๐—ฟ๐—ฑ๐˜€ ๐Ÿงพ A 300+ page ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐˜€๐˜๐˜‚๐—ฑ๐˜† ๐—ด๐˜‚๐—ถ๐—ฑ๐—ฒ ๐Ÿงพ A 120- page ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ค๐˜‚๐—ถ๐—ฐ๐—ธ ๐—ฆ๐—ต๐—ฒ๐—ฒ๐˜๐˜€ ๐Ÿค– The ThorBot (๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—–๐—ต๐—ฎ๐˜๐—ฏ๐—ผ๐˜) ๐Ÿ“‡ A 2,500-word ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ด๐—น๐—ผ๐˜€๐˜€๐—ฎ๐—ฟ๐˜† ๐Ÿ“‡ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐— ๐—ป๐—ฒ๐—บ๐—ผ๐—ป๐—ถ๐—ฐ๐˜€ ๐Ÿ—“๏ธ A ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐˜€๐˜๐˜‚๐—ฑ๐˜† ๐—ฝ๐—น๐—ฎ๐—ป ๐Ÿ’ป ๐—ฆ๐˜‚๐—ฏ๐˜๐—ถ๐˜๐—น๐—ฒ๐˜€ ๐—ถ๐—ป ๐Ÿด ๐—น๐—ฎ๐—ป๐—ด๐˜‚๐—ฎ๐—ด๐—ฒ๐˜€ (English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese and Hindi.) ๐‚๐ก๐š๐ฉ๐ญ๐ž๐ซ๐ฌ: 00:03 - Introduction to cryptographic attacks and social engineering. 00:26 - Explanation of social engineering and why people fall for it. 01:08 - Example of a social engineering attack using an ice cream truck. 02:09 - Discussion on the importance of security awareness training. 02:52 - Overview of different social engineering approaches (authority, intimidation). 03:20 - Additional social engineering tactics (consensus, scarcity, urgency). 04:09 - Familiarity in social engineering and common ground exploitation. 04:34 - Explanation of rainbow tables and their use in cracking passwords. 04:56 - Known plaintext attacks and their implications. 05:52 - Introduction to Meet-in-the-Middle attacks and their relevance in cryptography. This video continues the discussion on cryptographic attacks, focusing on social engineering and its effectiveness in compromising security. The lecture highlights how attackers can trick individuals into revealing sensitive information, such as passwords, through techniques like authority, intimidation, consensus, scarcity, urgency, and familiarity. This video also covers rainbow tables, known plaintext attacks, chosen plaintext attacks, adaptive chosen plaintext attacks, and Meet-in-the-Middle attacks, explaining how these methods are used to crack encryption keys. Remember, the CISSP exam is a management-level exam, you need the right point of view to pass the exam. โœ… ๐—ข๐˜๐—ต๐—ฒ๐—ฟ ๐—ฉ๐—ถ๐—ฑ๐—ฒ๐—ผ๐˜€ ๐—ฌ๐—ผ๐˜‚ ๐— ๐—ถ๐—ด๐—ต๐˜ ๐—•๐—ฒ ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ฒ๐˜€๐˜๐—ฒ๐—ฑ ๐—œ๐—ป ๐—ช๐—ฎ๐˜๐—ฐ๐—ต๐—ถ๐—ป๐—ด: ๐Ÿ‘‰ CISSP | Software Composition Analysis (SCA): https://youtu.be/057lIAaczQ4 ๐Ÿ‘‰ Certified in Cybersecurity (CC) - I failed the CC exam. Now what?: https://youtu.be/DVSMrxSwNQQ ๐Ÿ‘‰ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs ๐Ÿ‘‰ CISSP | The exam CISSP itself and how to mentally prepare for it: https://youtu.be/gKBJHi9hVkU ๐Ÿ‘‰ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs If this video helps you, please subscribe to my channel and like, comment, and share the video: https://www.youtube.com/@thorteaches/videos?sub_confirmation=1 ๐—œ ๐—ต๐—ผ๐—ฝ๐—ฒ ๐—œ ๐—ฐ๐—ฎ๐—ป ๐—ต๐—ฒ๐—น๐—ฝ ๐˜†๐—ผ๐˜‚ ๐—ด๐—ฒ๐˜ ๐—ฐ๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ, ๐—ง๐—ต๐—ผ๐—ฟ ๐—ฃ๐—ฒ๐—ฑ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ป โ€ช@thorteachesโ€ฌ #cissp #thorteachescomcissp #cc #cismandpmptraining #thorteachescom #pmptraining #training #pmp #cybersecurity #certification #informationsecurity #itsecurity #cybersecurity #cryptography #socialengineering #infosec #passwordsecurity #cyberattacks #securitytraining #encryption #cryptanalysis

Video Information

Views
468

Total views since publication

Likes
9

User likes and reactions

Duration
6:34

Video length

Published
Sep 6, 2021

Release date

Quality
hd

Video definition

Captions
Available

Subtitles enabled