Review of the major Cryptography concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam.
This MindMap review covers:
0:00 Introduction
0:30 What is Cryptography
1:35 Cryptography Services
1:39 Confidentiality
1:49 Integrity
2:00 Hashing
2:10 Authenticity
2:18 Non-Repudiation
2:43 Access Control
3:00 Plaintext
3:06 Encryption
3:24 Key/Crypto Variable
3:45 Ciphertext
3:54 Cryptographic Terminology Diagram
4:02 Key Clustering
4:26 Work Factor
4:36 Initialization Vector / Nonce
5:07 Confusion
5:25 Diffusion
5:40 Avalanche Effect
6:11 Hidden Secret Writing
6:19 Steganography
6:32 Null Cipher
6:58 Scrambled (Cryptograph) Methods
7:14 One-way Encryption
7:30 Hashing
8:15 Hashing Algorithms
8:24 Two-Way Encryption
8:44 Types of Two-Way Encryption
9:16 Symmetric Algorithms
10:44 Types of Symmetric Algorithms
10:50 Block Ciphers
11:00 Major Symmetric Block Ciphers
12:39 Block Modes
12:55 Electronic Codebook (ECB)
13:12 Counter Mode (CTR)
13:43 Stream Ciphers
14:09 Major Stream Cipher Algorithm
14:30 Asymmetric Algorithms
15:16 Advantages/Disadvantages of Asymmetric Algorithms
16:03 Factoring
16:28 Discrete Logs
18:04 Methods of Converting Plaintext to Cipher Text
18:13 Substitution
18:35 Caesar Cipher
19:20 Polyalphabetic Cipher
19:44 Running Key Cipher
19:54 One-time Pads
20:27 Transposition
20:39 Spartan Scytale
21:08 Rail Fence (ZigZag Cipher)
21:36 Outro
Other MindMaps:
Domain 1
Security & Risk Management: youtu.be/geGALIfOxtI
Domain 2
Asset Classification: youtu.be/aN9zkmzYTmQ
Privacy: youtu.be/lrI4QIa8S2I
Domain 3
Models and Frameworks: youtu.be/qZB6_lp9M30
Evaluation Criteria: youtu.be/WqHmDL7YAvw
Trusted Computing Base: youtu.be/fwU7n_3h058
Vulnerabilities in Systems: youtu.be/fPUypU7ysMw
Cloud: youtu.be/-rWQ7YuxiLY
Cryptography: youtu.be/LLRaa0kOMDM
Digital Certificates, Digital Signatures & PKI: youtu.be/8XKdFSG3ua4
Cryptanalysis: youtu.be/pnITDgs63M4
Physical Security: youtu.be/7ESQwNJ9HXU
Domain 5
Access Control Overview: youtu.be/BUcoABZzeQ4
Single Sing-on & Federated Access: youtu.be/_U4QMIxVk8M
Domain 6
Security Assessment and Testing Overview: youtu.be/eDVZvw5NziA
Vulnerability Assessment and Penetration Testing: youtu.be/vZ0S8GdWiIk
Logging & Monitoring: youtu.be/cwcARccyWyY
Domain 7
Investigations: youtu.be/Urev5cZgny8
Incident Response: youtu.be/PwxFwndQ7Jk
Malware: youtu.be/SVbrRozyIpo
Patching & Change Management: youtu.be/xX4U6Lz82Bk
Recovery Strategies: youtu.be/DrrfrJBnx28
Business Continuity Management (BCM): youtu.be/oAjNL3I_3-E
Domain 8
Secure Software Development: youtu.be/fS5WWjuyFmQ
Databases: youtu.be/-70DBd6cNDw
CISSP Master Instructor, John Berti: linkedin.com/in/jberti/
Visuals, narration and CISSP Master Instructor, Rob Witcher: linkedin.com/in/robwitcher/
Video editing by Nick: threntinfo@gmail.com
#CISSPDomain3Review #MindMap
- CISSP Domain 3 Review / Mind Map (6 of 9) | Cryptography ( Download)
- Cryptography MindMap (6 of 9) | CISSP Domain 3 ( Download)
- CISSP Domain 3 Review / Mind Map (8 of 9) | Cryptanalysis ( Download)
- CISSP Domain 3 Review / Mind Map (7 of 9) | Digital Certificates, Digital Signatures & PKI ( Download)
- CISSP Domain 3 Review | Mind Map (9 of 9) | Physical Security ( Download)
- CISSP Domain 3 Review / Mind Map (5 of 9) | Cloud ( Download)
- CISSP Domain 6 Review / Mind Map (3 of 3) | Logging & Monitoring ( Download)
- CISSP Domain 3 Review / Mind Map (1 of 9) | Models and Frameworks ( Download)
- CISSP Domain 3 Review / Mind Map (3 of 9) | Trusted Computing Base ( Download)
- Cryptanalysis MindMap (8 of 9) | CISSP Domain 3 ( Download)
- CISSP Domain 3 Review / Mind Map (2 of 9) | Evaluation Criteria ( Download)
- CISSP Domain 6 Review / Mind Map (2 of 3) | Vulnerability Assessment and Penetration Testing ( Download)
- CISSP Domain 6 Review / Mind Map (1 of 3) | Security Assessment and Testing Overview ( Download)
- CISSP Domain 3 Review / Mind Map (4 of 9) | Vulnerabilities in Systems ( Download)
- CISSP Domain 7 Review / Mind Map (3 of 6) | Malware ( Download)