Video Description

Next we introduce Hashing and we begin by mapping out exactly what a Hash is, what it, does and where it falls short and why it's a disadvantage being one directional. You'll explore Hash collisions, how they happen, what it takes to recreate them, what happens when there is no integrity and how that is determined by the penetration tester and ethical hacker. We'll also discuss how a Hash is different from a digital signature and contrast against a MAC and PKI.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring