Course details
Cryptography has been used for thousands of years to secure messages, identities, vital information, and communications mechanisms. This course covers the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
- define key cryptographic terms
- identify the characteristics of quantum cryptography
- match symmetric key algorithms to their corresponding descriptions
- distinguish between types of asymmetric algorithms
- determine the appropriate use for a given message format
- recognize types of ciphers
- match types of cryptanalytic attack with their corresponding descriptions
- distinguish between types of algorithms, message formats, ciphers, and cryptanalytic attacks
- determine the appropriate cryptography implementation for a given scenario
- determine the appropriate hash algorithm to use in a given scenario
- recognize characteristics of message authentication codes
- identify the characteristics of digital signatures
- identify guidelines for key management and distribution
- identify characteristics of the XKMS
- recognize the appropriate application of the split knowledge method of key management
- recognize methods of key distribution
- determine the appropriate hashing algorithm to use in a given scenario
- evaluate the actions of an individual who is practicing key management
- recognize examples of key management methods
About New Horizons Jordan
- 300 computer training centers in 70 countries (and counting)
- Largest Guaranteed-to-Run ctheirse schedule in the world
- Ranked in the top 5% of the industry for training quality and customer satisfaction
- Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
- Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
- World’s largest Cisco-authorized training partner
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- USD 18Duration: Upto 2 Hours
- Data Protection Course LineUSD 24
USD 200Duration: Upto 3 Hours