Review of the major Digital Certificates, Digital Signatures, PKI & Key Management concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam.

This MindMap review covers:
0:00 Introduction
0:34 Digital Signatures and Digital Certificates
0:56 Digital Signatures
1:36 Integrity
1:41 Authenticity
1:47 Non-Repudiation
2:13 Digital Certificates
3:25 Creators of Digital Certification
3:48 Standard of Digital Certification
4:00 Certificate Replacement
4:26 Certificate Revocation
5:40 CRL - Certificate Revocation List
6:05 OCSP - Online Certificate Status Protocol
6:29 Certificate Pinning
7:23 Public Key Infrastructure (PKI)
7:54 Certificate Authority
8:39 Registration Authority
8:53 Intermediate / Issuing CA
10:35 Certificate DB
10:47 Certificate Store
10:07 Key Management
10:24 Kerckhoffs's principle
12:05 Key Generation
12:20 Key Distribution
12:31 Diffie-Hellman Key Exchange Protocol
12:44 Out-of-Band key distribution
13:05 Hybrid key distribution
13:41 Key Storage
13:51 TPM - Trusted Platform Modules
14:11 HSM - Hardware Security Modules
14:29 Key Rotation
14:48 Key Disposition
15:05 Crypto-shredding
15:31 Key Recovery
16:30 Outro


Other MindMaps:

Domain 1
Security & Risk Management: https://youtu.be/geGALIfOxtI

Domain 2
Asset Classification: https://youtu.be/aN9zkmzYTmQ
Privacy: https://youtu.be/lrI4QIa8S2I

Domain 3
Models and Frameworks: https://youtu.be/qZB6_lp9M30
Evaluation Criteria: https://youtu.be/WqHmDL7YAvw
Trusted Computing Base: https://youtu.be/fwU7n_3h058
Vulnerabilities in Systems: https://youtu.be/fPUypU7ysMw
Cloud: https://youtu.be/-rWQ7YuxiLY
Cryptography: https://youtu.be/LLRaa0kOMDM
Digital Certificates, Digital Signatures & PKI: https://youtu.be/8XKdFSG3ua4
Cryptanalysis: https://youtu.be/pnITDgs63M4
Physical Security: https://youtu.be/7ESQwNJ9HXU

Domain 5
Access Control Overview: https://youtu.be/BUcoABZzeQ4
Single Sing-on & Federated Access: https://youtu.be/_U4QMIxVk8M

Domain 6
Security Assessment and Testing Overview: https://youtu.be/eDVZvw5NziA
Vulnerability Assessment and Penetration Testing: https://youtu.be/vZ0S8GdWiIk
Logging & Monitoring: https://youtu.be/cwcARccyWyY

Domain 7
Investigations: https://youtu.be/Urev5cZgny8
Incident Response: https://youtu.be/PwxFwndQ7Jk
Malware: https://youtu.be/SVbrRozyIpo
Patching & Change Management: https://youtu.be/xX4U6Lz82Bk
Recovery Strategies: https://youtu.be/DrrfrJBnx28
Business Continuity Management (BCM): https://youtu.be/oAjNL3I_3-E

Domain 8
Secure Software Development: https://youtu.be/fS5WWjuyFmQ
Databases: https://youtu.be/-70DBd6cNDw

CISSP Master Instructor, John Berti: https://www.linkedin.com/in/jberti/
Visuals, narration and CISSP Master Instructor, Rob Witcher: https://www.linkedin.com/in/robwitcher/
Video editing by Nick: [email protected]

#CISSPDomain3Review #DigitalCertificates