Video Description

This lesson on Cryptography focuses on public key cryptography. You'll learn why every user on the network is given a public and how a private key is still needed for encryption. We discuss how the public and private key exchange happens, how Asymmetric Cryptography works, what has to happen so that public and private key exchanges can authenticate, and what the advantage/disadvantages are to employing Asymmetric Cryptography. In closing we contrast Symmetric vs. Asymmetric Cryptography and the advantages that occur between slow and fast transactions.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring