CISSP Domain 3 Preview: Protecting Data from Cryptography Attacks ๐Ÿ”

Discover how attackers target cryptography and learn effective strategies to defend your data. Dive into social engineering tactics and more in this comprehensive CISSP Domain 3 overview.

CISSP Domain 3 Preview: Protecting Data from Cryptography Attacks ๐Ÿ”
CISSP Domain 3 Preview: Protecting Data from Cryptography Attacks ๐Ÿ”

About this video

There are a wide variety of ways attackers can try to gain access to our data. One of the easiest and non-technical approaches is social engineering. Subscribe to my channel: https://www.youtube.com/@thorteaches/videos?sub_confirmation=1

โœ… ๐—๐—ผ๐—ถ๐—ป ๐—ผ๐˜‚๐—ฟ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ, ๐—–๐—œ๐—ฆ๐— , ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐˜๐—ถ๐—ฒ๐˜€:
๐Ÿ‘‰ ๐—๐—ผ๐—ถ๐—ป ๐—ข๐˜‚๐—ฟ ๐—™๐—ฎ๐—ฐ๐—ฒ๐—ฏ๐—ผ๐—ผ๐—ธ ๐—ฆ๐˜๐˜‚๐—ฑ๐˜† ๐—š๐—ฟ๐—ผ๐˜‚๐—ฝ: https://www.facebook.com/groups/ThorTeaches
๐Ÿ‘‰ ๐—๐—ผ๐—ถ๐—ป ๐—ข๐˜‚๐—ฟ ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐—ฟ๐—ฑ ๐—ฆ๐˜๐˜‚๐—ฑ๐˜† ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ: https://discord.com/invite/GT8fr3Q

โœ… ๐—–๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜ ๐˜„๐—ถ๐˜๐—ต ๐—บ๐—ฒ:
๐Ÿ‘‰ Connect with Me on LinkedIn: https://www.linkedin.com/in/thorpedersen/
๐Ÿ‘‰ Connect with Me on Facebook: https://www.facebook.com/ThorPedersen0

โœ… ๐—”๐—ฏ๐—ผ๐˜‚๐˜ ๐—บ๐˜† ๐—ฐ๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐˜€:
๐Ÿ‘‰ ๐—š๐—ฒ๐˜ ๐—บ๐˜† ๐—–๐—ผ๐—บ๐—ฝ๐—น๐—ฒ๐˜๐—ฒ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ, ๐—–๐—œ๐—ฆ๐— , ๐—ฎ๐—ป๐—ฑ ๐—–๐—– ๐—ฏ๐˜‚๐—ป๐—ฑ๐—น๐—ฒ๐˜€ โžก๏ธ https://thorteaches.com/
๐Ÿ‘‰ ๐—–๐—ผ๐—บ๐—ฝ๐—ฎ๐—ฟ๐—ฒ ๐˜„๐—ต๐—ฎ๐˜ ๐˜†๐—ผ๐˜‚ ๐—ด๐—ฒ๐˜ ๐—ผ๐—ป ๐—ง๐—ต๐—ผ๐—ฟ๐—ง๐—ฒ๐—ฎ๐—ฐ๐—ต๐—ฒ๐˜€.๐—ฐ๐—ผ๐—บ ๐˜ƒ๐˜€. ๐—จ๐—ฑ๐—ฒ๐—บ๐˜† โžก๏ธ https://thorteaches.com/vs/
๐Ÿ‘‰ ๐—š๐—ฒ๐˜ ๐—บ๐˜† ๐—ฐ๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐˜€ ๐—ผ๐—ป ๐—จ๐—ฑ๐—ฒ๐—บ๐˜† (Less questions, no flashcards, no glossary, no chatbot)โžก๏ธ https://thorteaches.com/udemy/


โœจThe CISSP is ๐˜๐—ต๐—ฒ ๐—š๐—ข๐—Ÿ๐—— ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐—ฎ๐—ฟ๐—ฑ of IT and Cybersecurity certifications.
โœจCISSPs in North America, on average, ๐—บ๐—ฎ๐—ธ๐—ฒ $๐Ÿญ๐Ÿฐ๐Ÿณ,๐Ÿณ๐Ÿฑ๐Ÿณ ๐—ฎ ๐˜†๐—ฒ๐—ฎ๐—ฟ, and globally it is $119,571. Certified individuals make, on average, 35% more than their non-certified colleagues. (source: ISC2)
โœจThere are over ๐Ÿณ๐Ÿฐ,๐Ÿฌ๐Ÿฌ๐Ÿฌ ๐—ผ๐—ฝ๐—ฒ๐—ป ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ท๐—ผ๐—ฏ๐˜€ in the US. (source: CyberSeek)
โœจWe have 5.5 million filled Cybersecurity jobs worldwide and a 4.8 million workforce gap. Jobs grew 8.7% last year (440,000 jobs). (source ISC2)


๐Ÿ‘จโ€๐Ÿ‘ฉโ€๐Ÿ‘งโ€๐Ÿ‘ฆ ๐Ÿฏ๐Ÿด๐Ÿฌ,๐Ÿฌ๐Ÿฌ๐Ÿฌ+ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—˜๐—ป๐—ฟ๐—ผ๐—น๐—น๐—บ๐—ฒ๐—ป๐˜๐˜€ โญ๐Ÿฐ.๐Ÿณ ๐—ฅ๐—ฎ๐˜๐—ถ๐—ป๐—ด โœ… ๐—™๐˜‚๐—น๐—น๐˜† ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ ๐—˜๐˜…๐—ฎ๐—บ ๐—จ๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ๐—ฑ
๐Ÿ›’ https://cart.thorteaches.com/cissp/

๐—ง๐—ผ ๐—ฝ๐—ฎ๐˜€๐˜€ ๐˜†๐—ผ๐˜‚๐—ฟ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ฒ๐˜…๐—ฎ๐—บ ๐˜†๐—ผ๐˜‚ ๐—ป๐—ฒ๐—ฒ๐—ฑ ๐˜๐—ต๐—ฒ ๐—ธ๐—ป๐—ผ๐˜„๐—น๐—ฒ๐—ฑ๐—ด๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐˜๐—ต๐—ฒ ๐—ฟ๐—ถ๐—ด๐—ต๐˜ ๐—ฎ๐—ฝ๐—ฝ๐—ฟ๐—ผ๐—ฎ๐—ฐ๐—ต.
๐—œ ๐˜๐—ฒ๐—ฎ๐—ฐ๐—ต ๐˜†๐—ผ๐˜‚ ๐—ฎ๐—น๐—น ๐—ผ๐—ณ ๐—ถ๐˜ ๐—ถ๐—ป ๐—บ๐˜† ๐—ผ๐—ป-๐—ฑ๐—ฒ๐—บ๐—ฎ๐—ป๐—ฑ ๐—–๐—ผ๐—บ๐—ฝ๐—น๐—ฒ๐˜๐—ฒ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ฐ๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ, ๐˜„๐—ต๐—ฒ๐—ฟ๐—ฒ ๐˜†๐—ผ๐˜‚ ๐—ด๐—ฒ๐˜:
โ–ถ๏ธ 34 hours of ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐˜ƒ๐—ถ๐—ฑ๐—ฒ๐—ผ๐˜€
๐Ÿ“ 5000+ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—พ๐˜‚๐—ฒ๐˜€๐˜๐—ถ๐—ผ๐—ป๐˜€, including:
๐Ÿ“ 625 Hard CISSP questions
๐Ÿ“ 750 Complex CISSP questions
๐Ÿ“ 3,250 Easy/Mid CISSP questions โ˜… Both as exam emulation and domain tests.
๐Ÿ“ 201 topic questions โ˜… 3 after each major topic
๐Ÿ“ 240 Domain practice questions โ˜… 30 after each domain
๐Ÿ“‡ 2,500 ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ณ๐—น๐—ฎ๐˜€๐—ต๐—ฐ๐—ฎ๐—ฟ๐—ฑ๐˜€
๐Ÿงพ A 300+ page ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐˜€๐˜๐˜‚๐—ฑ๐˜† ๐—ด๐˜‚๐—ถ๐—ฑ๐—ฒ
๐Ÿงพ A 120- page ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ค๐˜‚๐—ถ๐—ฐ๐—ธ ๐—ฆ๐—ต๐—ฒ๐—ฒ๐˜๐˜€
๐Ÿค– The ThorBot (๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—–๐—ต๐—ฎ๐˜๐—ฏ๐—ผ๐˜)
๐Ÿ“‡ A 2,500-word ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ด๐—น๐—ผ๐˜€๐˜€๐—ฎ๐—ฟ๐˜†
๐Ÿ“‡ ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐— ๐—ป๐—ฒ๐—บ๐—ผ๐—ป๐—ถ๐—ฐ๐˜€
๐Ÿ—“๏ธ A ๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐˜€๐˜๐˜‚๐—ฑ๐˜† ๐—ฝ๐—น๐—ฎ๐—ป
๐Ÿ’ป ๐—ฆ๐˜‚๐—ฏ๐˜๐—ถ๐˜๐—น๐—ฒ๐˜€ ๐—ถ๐—ป ๐Ÿด ๐—น๐—ฎ๐—ป๐—ด๐˜‚๐—ฎ๐—ด๐—ฒ๐˜€ (English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese and Hindi.)

๐‚๐ก๐š๐ฉ๐ญ๐ž๐ซ๐ฌ:
00:03 - Introduction to cryptographic attacks and social engineering.
00:26 - Explanation of social engineering and why people fall for it.
01:08 - Example of a social engineering attack using an ice cream truck.
02:09 - Discussion on the importance of security awareness training.
02:52 - Overview of different social engineering approaches (authority, intimidation).
03:20 - Additional social engineering tactics (consensus, scarcity, urgency).
04:09 - Familiarity in social engineering and common ground exploitation.
04:34 - Explanation of rainbow tables and their use in cracking passwords.
04:56 - Known plaintext attacks and their implications.
05:52 - Introduction to Meet-in-the-Middle attacks and their relevance in cryptography.

This video continues the discussion on cryptographic attacks, focusing on social engineering and its effectiveness in compromising security. The lecture highlights how attackers can trick individuals into revealing sensitive information, such as passwords, through techniques like authority, intimidation, consensus, scarcity, urgency, and familiarity.

This video also covers rainbow tables, known plaintext attacks, chosen plaintext attacks, adaptive chosen plaintext attacks, and Meet-in-the-Middle attacks, explaining how these methods are used to crack encryption keys.

Remember, the CISSP exam is a management-level exam, you need the right point of view to pass the exam.


โœ… ๐—ข๐˜๐—ต๐—ฒ๐—ฟ ๐—ฉ๐—ถ๐—ฑ๐—ฒ๐—ผ๐˜€ ๐—ฌ๐—ผ๐˜‚ ๐— ๐—ถ๐—ด๐—ต๐˜ ๐—•๐—ฒ ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ฒ๐˜€๐˜๐—ฒ๐—ฑ ๐—œ๐—ป ๐—ช๐—ฎ๐˜๐—ฐ๐—ต๐—ถ๐—ป๐—ด:
๐Ÿ‘‰ CISSP | Software Composition Analysis (SCA): https://youtu.be/057lIAaczQ4
๐Ÿ‘‰ Certified in Cybersecurity (CC) - I failed the CC exam. Now what?: https://youtu.be/DVSMrxSwNQQ
๐Ÿ‘‰ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs
๐Ÿ‘‰ CISSP | The exam CISSP itself and how to mentally prepare for it: https://youtu.be/gKBJHi9hVkU
๐Ÿ‘‰ Certified in Cybersecurity (CC) - How to design your career and certification path: https://youtu.be/OD7UPvx8pHs

If this video helps you, please subscribe to my channel and like, comment, and share the video: https://www.youtube.com/@thorteaches/videos?sub_confirmation=1

๐—œ ๐—ต๐—ผ๐—ฝ๐—ฒ ๐—œ ๐—ฐ๐—ฎ๐—ป ๐—ต๐—ฒ๐—น๐—ฝ ๐˜†๐—ผ๐˜‚ ๐—ด๐—ฒ๐˜ ๐—ฐ๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ,

๐—ง๐—ต๐—ผ๐—ฟ ๐—ฃ๐—ฒ๐—ฑ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ป
โ€ช@thorteachesโ€ฌ

#cissp #thorteachescomcissp #cc #cismandpmptraining #thorteachescom #pmptraining #training #pmp #cybersecurity #certification #informationsecurity #itsecurity #cybersecurity #cryptography #socialengineering #infosec #passwordsecurity #cyberattacks #securitytraining #encryption #cryptanalysis

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

468

Likes

9

Duration

6:34

Published

Sep 6, 2021

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.