top of page

Symmetric Key Encryption


I was fortunate enough to work in the security industry while studying for the CISSP.

Dealing with firewalls and creating VPNs was a daily routine, and this made the Cryptography domain of the CISSP VERY easy.

Others may not have the same opportunity, so I thought I would share with everyone how symmetric encryption is used in real life.

For other CISSP videos:

Let me know if you have any questions and thanks for watching!

Comments


119159849_10158061653118813_5314694876572739015_n.jpg
bottom of page