

First Experience With the CIA Triad | CISSP Real-World Example
I was just working on Stories of a CISSP: Change Management for the CISSP Course when I started to recall my first day at my first security job. When I look back now, I realize each task could be mapped to confidentiality, integrity, and availability. The three core information security concepts of the CISSP. My manager gave me the following tasks: * Generate my own public and private key in order to gain SSH access to customer firewall * Figure out how many subnets a
Feb 4


Understanding Rijndael With AES for the CISSP Exam
Rijndael can use different block sizes, but AES uses a fixed block size of 128-bits. So for AES, the block size must always be 128-bits!!! Key Size Block Size 128 128 192 128 256 128 Basic Information for Rijndael Official NIST standard Won first place out of 15 other AES contestants Pronounced “Rhine Dall” Named after its developers Vincent Rijmen and Joan Daemen Rijndael is the actual name of the algorithm, AES is the standard Symmetric block cipher Proved to have the best
Feb 3


Stories of a CISSP: CPTED
Winter is always a time of continuous critical thinking on this complex topic: what to do with the kids instead of being in the house all...
Feb 24, 2020


IoT - Core CISSP Concepts
IoT - Core CISSP Concepts
Jan 13, 2019


CISSP CDC - IPSec
Cross-domain correlation is a technique I (think?) I created when studying for the CISSP exam. It's the process of picking a random...
Dec 7, 2018


Practice Question: Internet of Things
One of the practice question review videos from the member's portal.
Apr 25, 2018


Practice Question Video: MD2 Hashing Algorithm
Members get access to this and other CISSP videos: https://www.studynotesandtheory.com/signup
Mar 3, 2018


Transport Layer Security Notes and Video
Video and Notes on Transport Layer Security Technical preventative control TLS is just one of those things that is going to be on the...
Jan 27, 2018


Exclusive-OR (XOR) CISSP Notes
Exclusive OR is a mathematical calculation in cryptography. It is a logical operation. There are other logical operations in our CISSP...
Jan 24, 2018


Known-Plaintext Attack
To watch more CISSP videos like this, become a member: https://www.studynotesandtheory.com/signup
Jan 22, 2018
