Video Description

In this subpart of our previous Hash lesson, we take a closer, more intimate look at digital signatures, SHA2 (256) and RSA, what is met by satisfying the digital signature standard, and what the entire packet transfer looks like when hashing takes place. We will also introduce concepts behind Protecting Data At Rest. Several key definitions are discussed included full disk encryption, file encryption, code signing with a discussion on how they differ, what occurs in each of those data transactions, and what happens as a result encrypted files systems at the operating system level and why Trusted Platform Module is useful and risky.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring