The CISSP exam covers 10 domains, one of which is cryptography. Cryptography covers the transformation of clear text to unreadable form to ensure secure data transmissions. This domain section of the CISSP Study Guide will act as a brief cryptography tutorial, defining the technology in greater detail and offering insight about algorithms, symmetric and asymmetric approaches and PKI deployments. Ensure your knowledge of cryptography by referring to our resources and testing your knowledge with our CISSP practice quiz, written by CISSP All-in-one Exam Guide author Shon Harris.
CISSP Essentials training: Domain 3, Cryptography
Cryptography -- essentially defined as the transformation of clear text into an unreadable form -- is the method used to store and transmit data securely so that only the intended recipient can view the protected data.
In this CISSP Essentials Security School lesson, learn how cryptography, its components, methods and uses are employed in the enterprise to store and transmit messages safely.
CISSP Domain: Cryptography tutorial spotlight article
In this CISSP Domain 3 article, which is a part of SearchSecurity.com's CISSP Essentials Security School, discover how cryptography works and its history, and why cryptography depends on more than strong algorithms and other enterprise encryption approaches.
Cryptography techniques for enterprise customers
In this video, Shon Harris, president of Logical Security, will explain cryptography techniques for the enterprise that comply with regulatory and legal requirements, as well as what you need to understand before buying or building cryptography solutions.
Bruce Schneier on cryptography and government information security
In this SearchSecurity.com video, author and leading security expert Bruce Schneier digs into the topics of the current state of cryptography and whether companies should care about the U.S. government's release of portions of the Comprehensive National Cybersecurity Initiative (CNCI).
Cryptography basics for infosec managers
Cryptography, filled with complicated mathematical algorithms, can be intimidating, causing infosec managers to delegate responsibility without truly understanding what's going on behind the scenes. Solution providers can provide an important service to customers by educating security managers about the key technology and business decisions that come with the use of encryption.
In this tip, IT managers will can gain a basic understanding of how cryptography works and cryptography algorithms from Mike Chapple.
What are new and commonly used public-key cryptography algorithms?
Public-key algorithms provide a solution to what had been a big problem for cryptographers for thousands of years: key exchange.
In this expert response, expert Michael Cobb breaks down public-key algorithms, as well as a variety of other encryption algorithms, and reviews the use cases for several types of cryptography.
About the author
Shon Harris, CISSP, MCSE, is the president of Logical Security, an IT security consulting and training company. She is a former engineer in the Air Force's Information Warfare unit, an instructor and the best-selling author of the previous three editions of this book. Shon has taught computer and information security to a wide range of clients, including RSA, the Department of Defense, the Department of Energy, the National Security Agency and many more.