Certified Information Systems Security Professional, Part 4 of 9: Cryptography and Net Topologies
with expert Kevin Henry
This course covers symmetric and asymmetric cryptography and their history will be covered along with topics like Public key infrastructure, and various attacks. Also network and communication security will be discussed with topics inluding: network topologies, cabling and finally end with looking at network solutions. This course is part of a series covering the ISC(2) Certified Information Systems Security Professional (CISSP).
Intermediate | 2h 58m | March 22, 2018
Course OutlineKevin Henry
Kevin is an international author, consultant and international <br />speaker. He is the official course development writer for ISC2 CISSP, ISACA CRISC and mile2’s C)ISSO. Kevin has been educating IT professionals for over 30 years. He also provides cyber security consulting and support services for organizations around the world. Assisting them with setting up Information Security programs and addressing areas ranging from in-depth risk analysis to policy creation and security awareness.