Review of the major Cryptography concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam.

This MindMap review covers:
0:00 Introduction
0:30 What is Cryptography
1:35 Cryptography Services
1:39 Confidentiality
1:49 Integrity
2:00 Hashing
2:10 Authenticity
2:18 Non-Repudiation
2:43 Access Control
3:00 Plaintext
3:06 Encryption
3:24 Key/Crypto Variable
3:45 Ciphertext
3:54 Cryptographic Terminology Diagram
4:02 Key Clustering
4:26 Work Factor
4:36 Initialization Vector / Nonce
5:07 Confusion
5:25 Diffusion
5:40 Avalanche Effect
6:11 Hidden Secret Writing
6:19 Steganography
6:32 Null Cipher
6:58 Scrambled (Cryptograph) Methods
7:14 One-way Encryption
7:30 Hashing
8:15 Hashing Algorithms
8:24 Two-Way Encryption
8:44 Types of Two-Way Encryption
9:16 Symmetric Algorithms
10:44 Types of Symmetric Algorithms
10:50 Block Ciphers
11:00 Major Symmetric Block Ciphers
12:39 Block Modes
12:55 Electronic Codebook (ECB)
13:12 Counter Mode (CTR)
13:43 Stream Ciphers
14:09 Major Stream Cipher Algorithm
14:30 Asymmetric Algorithms
15:16 Advantages/Disadvantages of Asymmetric Algorithms
16:03 Factoring
16:28 Discrete Logs
18:04 Methods of Converting Plaintext to Cipher Text
18:13 Substitution
18:35 Caesar Cipher
19:20 Polyalphabetic Cipher
19:44 Running Key Cipher
19:54 One-time Pads
20:27 Transposition
20:39 Spartan Scytale
21:08 Rail Fence (ZigZag Cipher)
21:36 Outro


Other MindMaps:

Domain 1
Security & Risk Management: https://youtu.be/geGALIfOxtI

Domain 2
Asset Classification: https://youtu.be/aN9zkmzYTmQ
Privacy: https://youtu.be/lrI4QIa8S2I

Domain 3
Models and Frameworks: https://youtu.be/qZB6_lp9M30
Evaluation Criteria: https://youtu.be/WqHmDL7YAvw
Trusted Computing Base: https://youtu.be/fwU7n_3h058
Vulnerabilities in Systems: https://youtu.be/fPUypU7ysMw
Cloud: https://youtu.be/-rWQ7YuxiLY
Cryptography: https://youtu.be/LLRaa0kOMDM
Digital Certificates, Digital Signatures & PKI: https://youtu.be/8XKdFSG3ua4
Cryptanalysis: https://youtu.be/pnITDgs63M4
Physical Security: https://youtu.be/7ESQwNJ9HXU

Domain 5
Access Control Overview: https://youtu.be/BUcoABZzeQ4
Single Sing-on & Federated Access: https://youtu.be/_U4QMIxVk8M

Domain 6
Security Assessment and Testing Overview: https://youtu.be/eDVZvw5NziA
Vulnerability Assessment and Penetration Testing: https://youtu.be/vZ0S8GdWiIk
Logging & Monitoring: https://youtu.be/cwcARccyWyY

Domain 7
Investigations: https://youtu.be/Urev5cZgny8
Incident Response: https://youtu.be/PwxFwndQ7Jk
Malware: https://youtu.be/SVbrRozyIpo
Patching & Change Management: https://youtu.be/xX4U6Lz82Bk
Recovery Strategies: https://youtu.be/DrrfrJBnx28
Business Continuity Management (BCM): https://youtu.be/oAjNL3I_3-E

Domain 8
Secure Software Development: https://youtu.be/fS5WWjuyFmQ
Databases: https://youtu.be/-70DBd6cNDw

CISSP Master Instructor, John Berti: https://www.linkedin.com/in/jberti/
Visuals, narration and CISSP Master Instructor, Rob Witcher: https://www.linkedin.com/in/robwitcher/
Video editing by Nick: [email protected]

#CISSPDomain3Review #MindMap