We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Security Architecture and Engineering

Cryptography for CISSP®

Kevin Henry

Questions related to cryptography tend to scare many CISSP® exam candidates. This course will teach you the essential knowledge of cryptography and cryptanalysis needed for the Certified Information Systems Security Professional examination.

Read more

Questions related to cryptography tend to scare many CISSP® exam candidates. This course will teach you the essential knowledge of cryptography and cryptanalysis needed for the Certified Information Systems Security Professional examination.

Cryptography is an important tool for the security professional. In this course, Security Architecture and Engineering: Cryptography for CISSP®, you’ll learn to understand and use cryptography effectively in your information security program. First, you’ll explore cryptographic algorithms and techniques. Next, you’ll discover the uses of cryptography. Finally, you’ll learn how to defend against cryptanalysis. When you’re finished with this course, you’ll have the skills and knowledge of Cryptography needed for the Certified Information Systems Security professional examination.

Enroll now

What's inside

Syllabus

Course Overview
Concepts of Cryptography
Cryptanalysis
Domain Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores concepts of cryptography and cryptanalysis, which are fundamental to information security
Taught by security expert Kevin Henry, who is recognized for his work in cryptography
Covers a comprehensive range of cryptographic algorithms and techniques
Focuses on the practical applications of cryptography in information security programs
Designed for CISSP® exam candidates seeking to master cryptography for their certification

Save this course

Save Security Architecture and Engineering: Cryptography for CISSP® to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Security Architecture and Engineering: Cryptography for CISSP®. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Security Architecture and Engineering: Cryptography for CISSP® will develop knowledge and skills that may be useful to these careers:
Cryptanalyst
Cryptanalysts analyze and break cryptographic algorithms and techniques. The Security Architecture and Engineering: Cryptography for CISSP® course can be very useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge will help you to develop and implement effective cryptanalytic techniques.
Cryptographer
Cryptographers develop and implement cryptographic algorithms and techniques to protect data. The Security Architecture and Engineering: Cryptography for CISSP® course can be very useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge will help you to develop and implement effective cryptographic solutions.
Security Engineer
Security Engineers implement and maintain security systems to protect an organization's computer networks and systems. The Security Architecture and Engineering: Cryptography for CISSP® course can be very useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge will help you to implement and maintain effective security systems.
Information Security Manager
Information Security Managers oversee the security of an organization's computer networks and systems. The Security Architecture and Engineering: Cryptography for CISSP® course can be very useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge will help you to develop and implement effective security policies and procedures.
Security Architect
Security Architects design, implement, and maintain security systems to protect an organization's computer networks and systems. The Security Architecture and Engineering: Cryptography for CISSP® course can be very useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge will help you to design and implement effective security systems.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization's computer networks and systems. The Security Architecture and Engineering: Cryptography for CISSP® course can be very useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge will help you to develop and implement effective security strategies and policies.
Penetration Tester
Penetration Testers test the security of an organization's computer networks and systems. The Security Architecture and Engineering: Cryptography for CISSP® course can be useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge can help you to develop and implement effective penetration testing strategies.
Risk Manager
Risk Managers assess and manage risks to an organization's computer networks and systems. The Security Architecture and Engineering: Cryptography for CISSP® course can be useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge can help you to assess and manage risks to your organization's data.
Auditor
Auditors assess the security of an organization's computer networks and systems. The Security Architecture and Engineering: Cryptography for CISSP® course can be useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge can help you to assess the security of your organization's data.
Security Consultant
Security Consultants provide security advice and guidance to organizations. The Security Architecture and Engineering: Cryptography for CISSP® course can be useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge can help you to provide effective security advice and guidance to your clients.
Educator
Educators teach students about security. The Security Architecture and Engineering: Cryptography for CISSP® course can be useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge can help you to teach students about security effectively.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems. The Security Architecture and Engineering: Cryptography for CISSP® course can be useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge can help you to develop and implement effective security measures to protect your organization's data.
Forensic Analyst
Forensic Analysts investigate cybercrimes. The Security Architecture and Engineering: Cryptography for CISSP® course may be useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge may help you to investigate cybercrimes effectively.
Malware Analyst
Malware Analysts analyze and investigate malware. The Security Architecture and Engineering: Cryptography for CISSP® course may be useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge may help you to analyze and investigate malware.
Incident Responder
Incident Responders respond to security incidents. The Security Architecture and Engineering: Cryptography for CISSP® course may be useful for this role. In this course, you will learn about cryptographic algorithms and techniques, the uses of cryptography, and how to defend against cryptanalysis. This knowledge may help you to respond to security incidents effectively.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Architecture and Engineering: Cryptography for CISSP®.
A comprehensive textbook that covers the fundamentals of cryptography and network security. It provides a solid foundation for understanding the concepts and techniques used in this course.
An essential study guide for the CISSP certification exam. It provides a comprehensive overview of the exam topics and includes practice questions.
An in-depth guide to the design and implementation of cryptographic algorithms and protocols. It provides a wealth of practical advice and insights.
A textbook that provides a comprehensive introduction to cryptography. It covers a wide range of topics, from the basics of number theory to the latest developments in quantum cryptography.
A comprehensive reference guide to applied cryptography. It provides a wealth of information on the latest developments in the field.
An advanced textbook that provides a comprehensive overview of modern cryptography. It covers the latest developments in the field and is an excellent resource for those seeking a deeper understanding of the subject.
A fascinating and accessible introduction to the history of cryptography. It provides a great overview of the different techniques and methods that have been used throughout history.
A unique perspective on security that focuses on the human element. It provides insights into how attackers think and how to protect against social engineering attacks.
A popular book that provides a clear and concise introduction to cryptography. It good resource for those who are new to the field.
A comprehensive textbook that covers a wide range of security topics. It provides a good overview of the fundamental concepts and best practices.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Architecture and Engineering: Cryptography for CISSP®.
Exam Review Tips and Tricks for CISSP®
Most relevant
Security Operations: Operations Management for CISSP®
Most relevant
Security Architecture and Engineering: Security Controls...
Most relevant
Asset Security for CISSP®
Most relevant
Security and Risk Management: Principles of Risk for...
Most relevant
Security Architecture and Engineering: Secure Design...
Most relevant
Software Development Security for CISSP®
Most relevant
Security Operations: Business Resilience and Incident...
Most relevant
Security Architecture and Engineering: Physical Security...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser