Video description
Cryptography
Shon Harris
The fast, powerful way to prepare for your SSCP exam!
Get all the hands-on training you need to pass (ISC)²’s tough
SSCP exam, get certified, and move forward in your IT security
career! In this online video, the world’s #1 information security
trainer walks you through every skill and concept you’ll need to
master. This online video contains over five hours of training
adapted from Shon Harris’s legendary five-day SSCP boot
camps–including realistic labs, scenarios, case studies, and
animations designed to build and test your knowledge in real-world
settings!
Comprehensive coverage of SSCP domains of knowledge:
. Cryptographic
Definitions
. Types of Ciphers
Used Today
. Digital
Certificates
. Digital
Watermarking
.
E-Commerce
. Attack
Types
About the Shon Harris Security Series
This online video is part of a complete library of books,
online services, and videos designed to help security professionals
enhance their skills and prepare for their certification exams.
Every product in this series reflects Shon Harris’s unsurpassed
experience in teaching IT security professionals.
Category: Security
System Requirements
OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4
(Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card
with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more
Table of Contents
Course Introduction
00:17:17
Domain 5 - Cryptography
00:01:17
Services Provided by Cryptography
00:01:13
Cryptographic Definitions
00:01:15
Cipher
00:01:36
A Few More Definitions
00:01:09
Need Some More Definitions?
00:01:13
Symmetric Cryptography - Use of Secret Keys
00:00:46
Historical Uses of Symmetric Cryptography - Hieroglyphics
00:00:48
Scytale Cipher
00:01:03
Substitution Ciphers
00:01:55
Simple Substitution Cipher Atbash
00:01:19
Simple Substitution Cipher Caesar Cipher
00:01:59
Simple Substitution Cipher ROT13
00:01:33
Historical Uses
00:01:14
Polyalphabetic Cipher - Vigenere Cipher
00:00:38
Polyalphabetic Substitution
00:00:18
Vigenere Algorithm
00:01:54
Enigma Machine
00:02:33
U-Boats Had Enigma Machines
00:02:40
Code Book
00:03:32
Agenda 1
00:01:30
Key and Algorithm Relationship
00:02:27
Does Size Really Matter?
00:00:35
Key Space
00:01:20
Ways of Breaking Cryptosystems - Brute Force
00:01:53
Brute Force Components
00:00:44
Ways of Breaking Cryptosystems - Frequency Analysis
00:01:40
Strength of a Cryptosystem
00:01:40
Do You Know What You Are Doing?
00:00:37
Developing Cryptographic Solutions In-House
00:01:15
Characteristics of Strong Algorithms
00:02:48
Open or Closed More Secure?
00:01:23
Agenda 2
00:00:39
Type of Symmetric Cipher - Block Cipher
00:01:09
S-Boxes Used In Block Ciphers
00:01:33
Binary Mathematical Function 1
00:01:25
Type of Symmetric Cipher - Stream Cipher
00:01:43
Symmetric Characteristics
00:00:46
Initialization Vectors
00:01:42
Security Holes
00:05:07
Strength of a Stream Cipher
00:01:02
Symmetric Key Cryptography
00:01:30
Out-of-Band Transmission
00:01:57
Symmetric Key Management Issue
00:02:05
Symmetric Downfalls
00:00:46
Why?
00:00:35
Asymmetric Cryptography
00:00:57
Key Functions
00:00:55
Public Key Cryptography Advantages
00:02:53
Asymmetric Algorithm Disadvantages
00:01:14
Confusing Names
00:01:39
Symmetric versus Asymmetric
00:00:59
Questions 1
00:04:29
When to Use Which Key
00:01:44
Using the Algorithm Types Together
00:00:39
Encryption Steps
00:02:28
Receiver’s Public Key Is Used to Encrypt the Symmetric Key
00:00:42
Receiver’s Private Key Is Used to Decrypt the Symmetric Key
00:01:16
Digital Envelope
00:01:07
Secret versus Session Keys
00:01:01
Asymmetric Algorithms We Will Dive Into
00:00:07
Asymmetric Algorithm - Diffie-Hellman
00:01:22
Diffie-Hellman
00:05:06
Key Agreement Schemes
00:00:49
Asymmetric Algorithm - RSA
00:01:35
Factoring Large Numbers
00:01:57
RSA Operations
00:01:08
RSA Key Size
00:01:00
El Gamal
00:00:41
ECC
00:01:11
ECC Benefits
00:00:50
Asymmetric Mathematics
00:03:34
Asymmetric Security
00:00:46
Mathematics
00:00:43
Symmetric Ciphers We Will Dive Into
00:06:12
Block Cipher
00:01:07
Double DES
00:01:36
Evolution of DES
00:00:59
Modes of 3DES
00:01:14
Encryption Modes
00:01:42
Block Cipher Modes - CBC
00:01:42
IV and CBC
00:00:47
Different Modes of Block Ciphers - ECB
00:01:29
ECB versus CBC
00:00:31
Block Cipher Modes - CFB and OFB
00:04:06
CFB and OFB Modes
00:01:42
Counter Mode
00:02:47
Modes Summary
00:01:46
Symmetric Cipher - AES
00:01:53
IDEA
00:00:41
RC4 and RC5
00:01:10
Agenda 3
00:00:37
Data Integrity
00:00:15
Hashing Steps
00:01:06
Protecting the Integrity of Data
00:01:01
Hashing Algorithms
00:02:22
Data Integrity Mechanisms
00:01:23
Hashing Strength
00:00:35
Question 1
00:01:06
More Protection in Data Integrity
00:00:40
MAC
00:01:12
HMAC - Sender
00:00:34
HMAC - Receiver
00:01:16
Another Look
00:01:03
What Services
00:00:38
Authentication Types
00:03:06
Integrity?
00:01:00
What Services?
00:01:30
Question 2
00:01:26
Digital Signatures
00:02:07
One More Look 1
00:00:36
U.S. Government Standard
00:01:04
What Is
00:01:12
Zero Knowledge Proof
00:01:07
Message Integrity Controls
00:01:01
Security Issues In Hashing
00:01:22
Example of a Birthday Attack
00:03:00
Birthday Attack Issues
00:00:52
Key Management
00:01:42
Key Backup
00:00:31
Key Management (Cont.)
00:00:38
Key Usage
00:01:34
Cryptoperiod
00:00:39
M-of-N
00:01:47
Key Types
00:01:22
Agenda 4
00:01:36
Components of PKI
00:00:37
PKI
00:00:47
PKI Steps
00:01:07
RA Roles
00:02:29
CA
00:00:34
Let’s Walk Through an Example
00:01:36
Digital Certificates
00:02:25
Certificate
00:00:45
Signing the Certificate
00:00:52
Verifying the Certificate
00:03:34
Trusted CA’s
00:01:30
Non-Trusted CA
00:02:49
One More Look 2
00:00:40
What Do You Do with a Certificate?
00:05:01
Components of PKI, Repository, and CRLs
00:02:21
Revoked?
00:01:50
CRL Process
00:02:45
Different Uses for Certificates
00:02:12
Cross Certification
00:02:58
PKI and Trust
00:01:41
Agenda 5
00:00:38
Historical Uses of Symmetric Cryptography - Vernam Cipher
00:00:54
Binary Mathematical Function 2
00:02:19
One-Time Pad In Action
00:00:45
One-Time Pad Characteristics
00:03:32
Steganography
00:01:57
Digital Watermarking
00:01:11
Link versus End-to-End Encryption
00:03:02
End-to-End Encryption
00:01:28
Encryption Location
00:01:14
Email Standards
00:02:16
You Decide
00:02:40
Non-Hierarchical
00:01:48
Secure Protocols
00:02:18
SSL Connection Setup
00:04:13
Example - SSL
00:01:09
Validating Certificate
00:00:58
Secure Protocols (Cont.)
00:02:16
SSL and the OSI Model
00:01:57
E-Commerce
00:04:15
How Are You Doing?
00:00:46
Hard the First Times Through
00:00:42
Secure Email Standard
00:02:05
Agenda 6
00:02:58
IPSec Key Management
00:01:48
IPSec Handshaking Process
00:01:00
VPN Establishment
00:01:54
SAs in Use
00:03:04
Key Issues Within IPSec
00:01:52
Configuration of SA Parameters
00:00:32
IPSec Configuration Options
00:00:44
IPSec Is a Suite of Protocols
00:03:17
AH and ESP Modes
00:02:13
IPSec Modes of Operation
00:01:14
VPN Establishment (Cont.)
00:02:04
Review
00:02:08
Questions 2
00:02:20
Attack Types
00:00:43
Attacks on Cryptosystems
00:01:23
Known-Plaintext Attack
00:01:53
Chosen-Plaintext Attack
00:01:11
Chosen-Ciphertext Attack
00:02:01
Adaptive Attacks
00:01:00
Side Channel Attacks
00:01:17
Domain 5 Review
00:01:30