top of page
71OMr0D4FrL._SL1500_.jpg
119159849_10158061653118813_5314694876572739015_n.jpg
71eSH5cSYiL._SL1377_.jpg
final.png

CISSP Study Plan – Day 2 of 55 | TLS, Symmetric & Asymmetric Encryption

Updated: 24 hours ago

"

"CISSPs are made at 5 a.m." - Luke Ahmed


Today marks Day 2 of Yihenew’s CISSP study plan, and the focus is on one of the most tested security topics: TLS, symmetric encryption, and asymmetric encryption.

Using Luke Ahmed’s Study Notes and Theory CISSP course and How to Think Like a Manager for the CISSP Exam, Yihenew is breaking down how TLS secures communication using a hybrid approach—asymmetric encryption for the initial key exchange and symmetric encryption for ongoing data transfer.


In this CISSP study plan session, Yihenew explored:


  • How symmetric encryption offers speed and efficiency for bulk data encryption

  • How asymmetric encryption enables secure key exchange without pre-shared secrets

  • The role of TLS in protecting data in transit during web sessions


If you’re following along with your own CISSP exam preparation plan, mastering these encryption fundamentals will help you in both the Communication and Network Security domain and in real-world security design.


Follow his full journey on TikTok or check out Day 3.


Yihenew's Resources in the Video:


Course


Practice Questions


 
 
  • Youtube
  • Instagram
  • Linkedin
  • Facebook
  • TikTok
bottom of page