CISSP Chapter 6 : Cryptography and Symmetric Key Algorithms
Topics covered -
1. Domain Security Architecture Engineering
2. Assess Mitigate Vulnerabilities
3. Cryptographic Systems
4. Cryptographic Solutions
5. Cryptographic Life Cycle
6. Cryptographic Methods
7. Cryptographic Foundations
8. Goals of Cryptography
9. Confidentiality
10. Symmetric Cryptosystems
11. Asymmetric Cryptosystems
12. Data At Rest
13. Data In Transit
14. Data In Use
15. Integrity
16. Authentication
17. Nonrepudiation
18. Cryptography Concepts
19. Plaintext and Ciphertext
20. Encrypt and Decrypt
21. Kerckhoffs's Principle
22. Cryptovariables
23. Cryptography and Cryptanalysis
24. Cryptology and Cryptosystems
25. FIPS 140–3 Standard
26. Cryptographic Mathematics
27. Boolean Mathematics
28. Logical Operations
29. AND, OR, NOT, XOR
30. One-Way Functions
31. Nonce
32. Zero-Knowledge Proof
33. Split Knowledge
34. Key Escrow
35. Work Function
36. Ciphers and Codes
37. Transposition Ciphers
38. Caesar Cipher
39. Substitution Ciphers
40. Vigenère Cipher
41. One-Time Pads
42. Running Key Ciphers
43. Block Ciphers
44. Stream Ciphers
45. Symmetric Key Cryptography
46. Ephemeral Key
47. Symmetric Cryptography Weaknesses
48. Asymmetric Key Algorithms
49. Digital Signature Technology
50. Asymmetric Cryptography Strengths
51. Hybrid Cryptography
52. Symmetric Asymmetric Comparison
53. Block Cipher Modes
54. Electronic Codebook Mode (ECB)
55. Cipher Block Chaining (CBC)
56. Cipher Feedback (CFB)
57. Output Feedback (OFB)
58. Counter Mode (CTR)
59. Galois/Counter Mode (GCM)
60. CCM Mode
61. Data Encryption Standard (DES)
62. Triple DES (3DES)
63. International Data Encryption Algorithm (IDEA)
64. Blowfish
65. SKIPJACK
66. Rivest Ciphers (RC Family)
67. Advanced Encryption Standard (AES)
68. CAST Algorithms
69. Symmetric Algorithms Comparison
70. Symmetric Key Management
71. Offline Key Distribution
72. Public Key Encryption
73. Diffie–Hellman
74. Key Storage Destruction
75. Software-based Key Storage
76. Hardware-based Key Storage
77. Cloud-based Key Storage
78. Key Escrow and Recovery
79. Fair Cryptosystems
80. Escrowed Encryption Standard
81. Key Recovery Agents
82. Cryptographic Life Cycle
83. Cryptography Summary
84. Study Essentials
🎧 AudioCert – The Official Study Guide, Brought to Life 🎧
AudioCert is more than a podcast—it’s your on-the-go mentor for conquering cybersecurity, networking, and IT certifications. Every episode is built directly from the official study guides, ensuring you get complete, accurate, and exam-ready coverage—not shortcuts or summaries.
From CISSP to CEH, Security+ to CCSP, we turn dense chapters into engaging, real-world audio lessons designed for busy professionals who learn best on the move.
Complex concepts are simplified with practical analogies and relatable examples, so the knowledge sticks.
🔑 Why Learners Choose AudioCert:
• 100% Official Content – Every lesson drawn only from official study guides.
• Full Exam Coverage – All chapters, all domains, nothing left behind.
• Real-World Clarity – Technical concepts explained through analogies that make sense.
• Anywhere Learning – Perfect for your commute, gym sessions, or downtime.
📘 Certifications We Cover:
• (ISC)² – CISSP, CCSP, SSCP
• EC-Council – CEH, CHFI, and more
• CompTIA – Security+, Network+, CySA+
• …plus other leading certifications.
✅ Plug in.
✅ Tune out distractions.
✅ Master the official material—one chapter at a time.
With AudioCert, the official study guide doesn’t stay on your shelf—it moves with you.