CISSP Domain 3 Preview | Digital signatures
Digital signatures can help us with the authenticity, integrity, confidentiality, and non-repudiation of digital messages or documents. Subscribe to my chann...

ThorTeaches.com: CISSP, CC, CISM, GenAI training
1.2K views โข Sep 9, 2021

About this video
Digital signatures can help us with the authenticity, integrity, confidentiality, and non-repudiation of digital messages or documents. Subscribe to my channel: https://www.youtube.com/@thorteaches/videos?sub_confirmation=1
โ ๐๐ผ๐ถ๐ป ๐ผ๐๐ฟ ๐๐๐ฆ๐ฆ๐ฃ, ๐๐๐ฆ๐ , ๐๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฒ๐ฑ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ผ๐บ๐บ๐๐ป๐ถ๐๐ถ๐ฒ๐:
๐ ๐๐ผ๐ถ๐ป ๐ข๐๐ฟ ๐๐ฎ๐ฐ๐ฒ๐ฏ๐ผ๐ผ๐ธ ๐ฆ๐๐๐ฑ๐ ๐๐ฟ๐ผ๐๐ฝ: https://www.facebook.com/groups/ThorTeaches
๐ ๐๐ผ๐ถ๐ป ๐ข๐๐ฟ ๐๐ถ๐๐ฐ๐ผ๐ฟ๐ฑ ๐ฆ๐๐๐ฑ๐ ๐๐ฒ๐ฟ๐๐ฒ๐ฟ: https://discord.com/invite/GT8fr3Q
โ ๐๐ผ๐ป๐ป๐ฒ๐ฐ๐ ๐๐ถ๐๐ต ๐บ๐ฒ:
๐ Connect with Me on LinkedIn: https://www.linkedin.com/in/thorpedersen/
๐ Connect with Me on Facebook: https://www.facebook.com/ThorPedersen0
โ ๐๐ฏ๐ผ๐๐ ๐บ๐ ๐ฐ๐ผ๐๐ฟ๐๐ฒ๐:
๐ ๐๐ฒ๐ ๐บ๐ ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ฆ๐ฆ๐ฃ, ๐๐๐ฆ๐ , ๐ฎ๐ป๐ฑ ๐๐ ๐ฏ๐๐ป๐ฑ๐น๐ฒ๐ โก๏ธ https://thorteaches.com/
๐ ๐๐ผ๐บ๐ฝ๐ฎ๐ฟ๐ฒ ๐๐ต๐ฎ๐ ๐๐ผ๐ ๐ด๐ฒ๐ ๐ผ๐ป ๐ง๐ต๐ผ๐ฟ๐ง๐ฒ๐ฎ๐ฐ๐ต๐ฒ๐.๐ฐ๐ผ๐บ ๐๐. ๐จ๐ฑ๐ฒ๐บ๐ โก๏ธ https://thorteaches.com/vs/
๐ ๐๐ฒ๐ ๐บ๐ ๐ฐ๐ผ๐๐ฟ๐๐ฒ๐ ๐ผ๐ป ๐จ๐ฑ๐ฒ๐บ๐ (Less questions, no flashcards, no glossary, no chatbot)โก๏ธ https://thorteaches.com/udemy/
โจThe CISSP is ๐๐ต๐ฒ ๐๐ข๐๐ ๐๐๐ฎ๐ป๐ฑ๐ฎ๐ฟ๐ฑ of IT and Cybersecurity certifications.
โจCISSPs in North America, on average, ๐บ๐ฎ๐ธ๐ฒ $๐ญ๐ฐ๐ณ,๐ณ๐ฑ๐ณ ๐ฎ ๐๐ฒ๐ฎ๐ฟ, and globally it is $119,571. Certified individuals make, on average, 35% more than their non-certified colleagues. (source: ISC2)
โจThere are over ๐ณ๐ฐ,๐ฌ๐ฌ๐ฌ ๐ผ๐ฝ๐ฒ๐ป ๐๐๐ฆ๐ฆ๐ฃ ๐ท๐ผ๐ฏ๐ in the US. (source: CyberSeek)
โจWe have 5.5 million filled Cybersecurity jobs worldwide and a 4.8 million workforce gap. Jobs grew 8.7% last year (440,000 jobs). (source ISC2)
๐จโ๐ฉโ๐งโ๐ฆ ๐ฏ๐ด๐ฌ,๐ฌ๐ฌ๐ฌ+ ๐๐๐ฆ๐ฆ๐ฃ ๐๐ป๐ฟ๐ผ๐น๐น๐บ๐ฒ๐ป๐๐ โญ๐ฐ.๐ณ ๐ฅ๐ฎ๐๐ถ๐ป๐ด โ ๐๐๐น๐น๐ ๐ฎ๐ฌ๐ฎ๐ฐ ๐๐ ๐ฎ๐บ ๐จ๐ฝ๐ฑ๐ฎ๐๐ฒ๐ฑ
๐ https://cart.thorteaches.com/cissp/
๐ง๐ผ ๐ฝ๐ฎ๐๐ ๐๐ผ๐๐ฟ ๐๐๐ฆ๐ฆ๐ฃ ๐ฒ๐ ๐ฎ๐บ ๐๐ผ๐ ๐ป๐ฒ๐ฒ๐ฑ ๐๐ต๐ฒ ๐ธ๐ป๐ผ๐๐น๐ฒ๐ฑ๐ด๐ฒ ๐ฎ๐ป๐ฑ ๐๐ต๐ฒ ๐ฟ๐ถ๐ด๐ต๐ ๐ฎ๐ฝ๐ฝ๐ฟ๐ผ๐ฎ๐ฐ๐ต.
๐ ๐๐ฒ๐ฎ๐ฐ๐ต ๐๐ผ๐ ๐ฎ๐น๐น ๐ผ๐ณ ๐ถ๐ ๐ถ๐ป ๐บ๐ ๐ผ๐ป-๐ฑ๐ฒ๐บ๐ฎ๐ป๐ฑ ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ฆ๐ฆ๐ฃ ๐ฐ๐ผ๐๐ฟ๐๐ฒ, ๐๐ต๐ฒ๐ฟ๐ฒ ๐๐ผ๐ ๐ด๐ฒ๐:
โถ๏ธ 34 hours of ๐๐๐ฆ๐ฆ๐ฃ ๐๐ถ๐ฑ๐ฒ๐ผ๐
๐ 5000+ ๐๐๐ฆ๐ฆ๐ฃ ๐พ๐๐ฒ๐๐๐ถ๐ผ๐ป๐, including:
๐ 625 Hard CISSP questions
๐ 750 Complex CISSP questions
๐ 3,250 Easy/Mid CISSP questions โ Both as exam emulation and domain tests.
๐ 201 topic questions โ 3 after each major topic
๐ 240 Domain practice questions โ 30 after each domain
๐บ๏ธ 34 ๐๐๐ฆ๐ฆ๐ฃ Mind Maps
๐ 2,500 ๐๐๐ฆ๐ฆ๐ฃ ๐ณ๐น๐ฎ๐๐ต๐ฐ๐ฎ๐ฟ๐ฑ๐
๐งพ A 300+ page ๐๐๐ฆ๐ฆ๐ฃ ๐๐๐๐ฑ๐ ๐ด๐๐ถ๐ฑ๐ฒ
๐งพ A 120- page ๐๐๐ฆ๐ฆ๐ฃ ๐ค๐๐ถ๐ฐ๐ธ ๐ฆ๐ต๐ฒ๐ฒ๐๐
๐ค The ThorBot (๐๐๐ฆ๐ฆ๐ฃ ๐๐ต๐ฎ๐๐ฏ๐ผ๐)
๐ A 2,500-word ๐๐๐ฆ๐ฆ๐ฃ ๐ด๐น๐ผ๐๐๐ฎ๐ฟ๐
๐ ๐๐๐ฆ๐ฆ๐ฃ ๐ ๐ป๐ฒ๐บ๐ผ๐ป๐ถ๐ฐ๐
๐๏ธ A ๐๐๐ฆ๐ฆ๐ฃ ๐๐๐๐ฑ๐ ๐ฝ๐น๐ฎ๐ป
๐ป ๐ฆ๐๐ฏ๐๐ถ๐๐น๐ฒ๐ ๐ถ๐ป ๐ด ๐น๐ฎ๐ป๐ด๐๐ฎ๐ด๐ฒ๐ (English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese and Hindi.)
๐๐ก๐๐ฉ๐ญ๐๐ซ๐ฌ:
00:03 - Introduction to digital signatures and Public Key Infrastructure (PKI).
00:26 - Explanation of key repositories and their importance.
01:17 - Process of retrieving a private key from the key repository.
02:01 - Dual control in key retrieval to prevent malicious actions.
02:43 - Importance of securely storing your secret key.
03:11 - Explanation of Key Escrow and its purpose.
04:03 - Detailed explanation of the flow of a digital signature.
05:46 - Importance of understanding the digital signature flow for exams.
07:12 - Overview of digital certificates, client-based and server-based.
09:57 - Discussion of the Clipper chip and its security flaws.
This video explains how digital signatures work to ensure data integrity and non-repudiation using asymmetric encryption. The lecture discusses key repositories, key escrow, and the importance of securely storing private keys.
Remember, the CISSP exam is a management-level exam, you need the right point of view to pass the exam.
โ ๐ข๐๐ต๐ฒ๐ฟ ๐ฉ๐ถ๐ฑ๐ฒ๐ผ๐ ๐ฌ๐ผ๐ ๐ ๐ถ๐ด๐ต๐ ๐๐ฒ ๐๐ป๐๐ฒ๐ฟ๐ฒ๐๐๐ฒ๐ฑ ๐๐ป ๐ช๐ฎ๐๐ฐ๐ต๐ถ๐ป๐ด:
๐ CISSP | Software Composition Analysis (SCA): https://youtu.be/057lIAaczQ4
๐ Certified in Cybersecurity (CC) - I failed the CC exam. Now what?: https://youtu.be/DVSMrxSwNQQ
๐ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs
๐ CISSP | The exam CISSP itself and how to mentally prepare for it: https://youtu.be/gKBJHi9hVkU
๐ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs
If this video helps you, please subscribe to my channel and like, comment, and share the video: https://www.youtube.com/@thorteaches/videos?sub_confirmation=1
๐ ๐ต๐ผ๐ฝ๐ฒ ๐ ๐ฐ๐ฎ๐ป ๐ต๐ฒ๐น๐ฝ ๐๐ผ๐ ๐ด๐ฒ๐ ๐ฐ๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฒ๐ฑ,
๐ง๐ต๐ผ๐ฟ ๐ฃ๐ฒ๐ฑ๐ฒ๐ฟ๐๐ฒ๐ป
โช@thorteachesโฌ
#cissp #thorteachescomcissp #cc #cismandpmptraining #thorteachescom #pmptraining #training #pmp #cybersecurity #certification #informationsecurity #itsecurity #cybersecurity #digitalsignatures #pki #encryption #infosec #cybersecuritytraining #certificationexam #dataintegrity #publickeyinfrastructure
โ ๐๐ผ๐ถ๐ป ๐ผ๐๐ฟ ๐๐๐ฆ๐ฆ๐ฃ, ๐๐๐ฆ๐ , ๐๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฒ๐ฑ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ผ๐บ๐บ๐๐ป๐ถ๐๐ถ๐ฒ๐:
๐ ๐๐ผ๐ถ๐ป ๐ข๐๐ฟ ๐๐ฎ๐ฐ๐ฒ๐ฏ๐ผ๐ผ๐ธ ๐ฆ๐๐๐ฑ๐ ๐๐ฟ๐ผ๐๐ฝ: https://www.facebook.com/groups/ThorTeaches
๐ ๐๐ผ๐ถ๐ป ๐ข๐๐ฟ ๐๐ถ๐๐ฐ๐ผ๐ฟ๐ฑ ๐ฆ๐๐๐ฑ๐ ๐๐ฒ๐ฟ๐๐ฒ๐ฟ: https://discord.com/invite/GT8fr3Q
โ ๐๐ผ๐ป๐ป๐ฒ๐ฐ๐ ๐๐ถ๐๐ต ๐บ๐ฒ:
๐ Connect with Me on LinkedIn: https://www.linkedin.com/in/thorpedersen/
๐ Connect with Me on Facebook: https://www.facebook.com/ThorPedersen0
โ ๐๐ฏ๐ผ๐๐ ๐บ๐ ๐ฐ๐ผ๐๐ฟ๐๐ฒ๐:
๐ ๐๐ฒ๐ ๐บ๐ ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ฆ๐ฆ๐ฃ, ๐๐๐ฆ๐ , ๐ฎ๐ป๐ฑ ๐๐ ๐ฏ๐๐ป๐ฑ๐น๐ฒ๐ โก๏ธ https://thorteaches.com/
๐ ๐๐ผ๐บ๐ฝ๐ฎ๐ฟ๐ฒ ๐๐ต๐ฎ๐ ๐๐ผ๐ ๐ด๐ฒ๐ ๐ผ๐ป ๐ง๐ต๐ผ๐ฟ๐ง๐ฒ๐ฎ๐ฐ๐ต๐ฒ๐.๐ฐ๐ผ๐บ ๐๐. ๐จ๐ฑ๐ฒ๐บ๐ โก๏ธ https://thorteaches.com/vs/
๐ ๐๐ฒ๐ ๐บ๐ ๐ฐ๐ผ๐๐ฟ๐๐ฒ๐ ๐ผ๐ป ๐จ๐ฑ๐ฒ๐บ๐ (Less questions, no flashcards, no glossary, no chatbot)โก๏ธ https://thorteaches.com/udemy/
โจThe CISSP is ๐๐ต๐ฒ ๐๐ข๐๐ ๐๐๐ฎ๐ป๐ฑ๐ฎ๐ฟ๐ฑ of IT and Cybersecurity certifications.
โจCISSPs in North America, on average, ๐บ๐ฎ๐ธ๐ฒ $๐ญ๐ฐ๐ณ,๐ณ๐ฑ๐ณ ๐ฎ ๐๐ฒ๐ฎ๐ฟ, and globally it is $119,571. Certified individuals make, on average, 35% more than their non-certified colleagues. (source: ISC2)
โจThere are over ๐ณ๐ฐ,๐ฌ๐ฌ๐ฌ ๐ผ๐ฝ๐ฒ๐ป ๐๐๐ฆ๐ฆ๐ฃ ๐ท๐ผ๐ฏ๐ in the US. (source: CyberSeek)
โจWe have 5.5 million filled Cybersecurity jobs worldwide and a 4.8 million workforce gap. Jobs grew 8.7% last year (440,000 jobs). (source ISC2)
๐จโ๐ฉโ๐งโ๐ฆ ๐ฏ๐ด๐ฌ,๐ฌ๐ฌ๐ฌ+ ๐๐๐ฆ๐ฆ๐ฃ ๐๐ป๐ฟ๐ผ๐น๐น๐บ๐ฒ๐ป๐๐ โญ๐ฐ.๐ณ ๐ฅ๐ฎ๐๐ถ๐ป๐ด โ ๐๐๐น๐น๐ ๐ฎ๐ฌ๐ฎ๐ฐ ๐๐ ๐ฎ๐บ ๐จ๐ฝ๐ฑ๐ฎ๐๐ฒ๐ฑ
๐ https://cart.thorteaches.com/cissp/
๐ง๐ผ ๐ฝ๐ฎ๐๐ ๐๐ผ๐๐ฟ ๐๐๐ฆ๐ฆ๐ฃ ๐ฒ๐ ๐ฎ๐บ ๐๐ผ๐ ๐ป๐ฒ๐ฒ๐ฑ ๐๐ต๐ฒ ๐ธ๐ป๐ผ๐๐น๐ฒ๐ฑ๐ด๐ฒ ๐ฎ๐ป๐ฑ ๐๐ต๐ฒ ๐ฟ๐ถ๐ด๐ต๐ ๐ฎ๐ฝ๐ฝ๐ฟ๐ผ๐ฎ๐ฐ๐ต.
๐ ๐๐ฒ๐ฎ๐ฐ๐ต ๐๐ผ๐ ๐ฎ๐น๐น ๐ผ๐ณ ๐ถ๐ ๐ถ๐ป ๐บ๐ ๐ผ๐ป-๐ฑ๐ฒ๐บ๐ฎ๐ป๐ฑ ๐๐ผ๐บ๐ฝ๐น๐ฒ๐๐ฒ ๐๐๐ฆ๐ฆ๐ฃ ๐ฐ๐ผ๐๐ฟ๐๐ฒ, ๐๐ต๐ฒ๐ฟ๐ฒ ๐๐ผ๐ ๐ด๐ฒ๐:
โถ๏ธ 34 hours of ๐๐๐ฆ๐ฆ๐ฃ ๐๐ถ๐ฑ๐ฒ๐ผ๐
๐ 5000+ ๐๐๐ฆ๐ฆ๐ฃ ๐พ๐๐ฒ๐๐๐ถ๐ผ๐ป๐, including:
๐ 625 Hard CISSP questions
๐ 750 Complex CISSP questions
๐ 3,250 Easy/Mid CISSP questions โ Both as exam emulation and domain tests.
๐ 201 topic questions โ 3 after each major topic
๐ 240 Domain practice questions โ 30 after each domain
๐บ๏ธ 34 ๐๐๐ฆ๐ฆ๐ฃ Mind Maps
๐ 2,500 ๐๐๐ฆ๐ฆ๐ฃ ๐ณ๐น๐ฎ๐๐ต๐ฐ๐ฎ๐ฟ๐ฑ๐
๐งพ A 300+ page ๐๐๐ฆ๐ฆ๐ฃ ๐๐๐๐ฑ๐ ๐ด๐๐ถ๐ฑ๐ฒ
๐งพ A 120- page ๐๐๐ฆ๐ฆ๐ฃ ๐ค๐๐ถ๐ฐ๐ธ ๐ฆ๐ต๐ฒ๐ฒ๐๐
๐ค The ThorBot (๐๐๐ฆ๐ฆ๐ฃ ๐๐ต๐ฎ๐๐ฏ๐ผ๐)
๐ A 2,500-word ๐๐๐ฆ๐ฆ๐ฃ ๐ด๐น๐ผ๐๐๐ฎ๐ฟ๐
๐ ๐๐๐ฆ๐ฆ๐ฃ ๐ ๐ป๐ฒ๐บ๐ผ๐ป๐ถ๐ฐ๐
๐๏ธ A ๐๐๐ฆ๐ฆ๐ฃ ๐๐๐๐ฑ๐ ๐ฝ๐น๐ฎ๐ป
๐ป ๐ฆ๐๐ฏ๐๐ถ๐๐น๐ฒ๐ ๐ถ๐ป ๐ด ๐น๐ฎ๐ป๐ด๐๐ฎ๐ด๐ฒ๐ (English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese and Hindi.)
๐๐ก๐๐ฉ๐ญ๐๐ซ๐ฌ:
00:03 - Introduction to digital signatures and Public Key Infrastructure (PKI).
00:26 - Explanation of key repositories and their importance.
01:17 - Process of retrieving a private key from the key repository.
02:01 - Dual control in key retrieval to prevent malicious actions.
02:43 - Importance of securely storing your secret key.
03:11 - Explanation of Key Escrow and its purpose.
04:03 - Detailed explanation of the flow of a digital signature.
05:46 - Importance of understanding the digital signature flow for exams.
07:12 - Overview of digital certificates, client-based and server-based.
09:57 - Discussion of the Clipper chip and its security flaws.
This video explains how digital signatures work to ensure data integrity and non-repudiation using asymmetric encryption. The lecture discusses key repositories, key escrow, and the importance of securely storing private keys.
Remember, the CISSP exam is a management-level exam, you need the right point of view to pass the exam.
โ ๐ข๐๐ต๐ฒ๐ฟ ๐ฉ๐ถ๐ฑ๐ฒ๐ผ๐ ๐ฌ๐ผ๐ ๐ ๐ถ๐ด๐ต๐ ๐๐ฒ ๐๐ป๐๐ฒ๐ฟ๐ฒ๐๐๐ฒ๐ฑ ๐๐ป ๐ช๐ฎ๐๐ฐ๐ต๐ถ๐ป๐ด:
๐ CISSP | Software Composition Analysis (SCA): https://youtu.be/057lIAaczQ4
๐ Certified in Cybersecurity (CC) - I failed the CC exam. Now what?: https://youtu.be/DVSMrxSwNQQ
๐ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs
๐ CISSP | The exam CISSP itself and how to mentally prepare for it: https://youtu.be/gKBJHi9hVkU
๐ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs
If this video helps you, please subscribe to my channel and like, comment, and share the video: https://www.youtube.com/@thorteaches/videos?sub_confirmation=1
๐ ๐ต๐ผ๐ฝ๐ฒ ๐ ๐ฐ๐ฎ๐ป ๐ต๐ฒ๐น๐ฝ ๐๐ผ๐ ๐ด๐ฒ๐ ๐ฐ๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฒ๐ฑ,
๐ง๐ต๐ผ๐ฟ ๐ฃ๐ฒ๐ฑ๐ฒ๐ฟ๐๐ฒ๐ป
โช@thorteachesโฌ
#cissp #thorteachescomcissp #cc #cismandpmptraining #thorteachescom #pmptraining #training #pmp #cybersecurity #certification #informationsecurity #itsecurity #cybersecurity #digitalsignatures #pki #encryption #infosec #cybersecuritytraining #certificationexam #dataintegrity #publickeyinfrastructure
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.2K
Likes
12
Duration
11:23
Published
Sep 9, 2021
User Reviews
4.2
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.