Chapter Title
Related domains:
1.0 General Security Concepts 12% 2.0 Threats, Vulnerabilities, and Mitigations 22%
Related sub-domains
1.4 Explain the importance of using appropriate cryptographic solutions. 2.3 Explain various types of vulnerabilities. 2.4 Given a scenario, analyze indicators of malicious activity
key escrow substitution polyalphabetic substitution transposition ciphers steganography symmetric encryption asymmetric encryption cryptography goals data at rest data in transit data in use obfuscation cryptography cryptanalysis Data Encryption Standard DES Advanced Encryption Standard AES symmetric encryption management Rivest, Shamir,, Adleman RSA hash Secure Hash Algorithm SHA Message-Digest MD5 digital signature Hash Message Authentication Code HMAC public key infrastructure PKI certificates Hardware Security Modules HSM key exchange cryptographic attacks trusted platform module TPM read over the exam essentials
Survey
Think about what could be included. Read the introduction / summary. Glance over the different titles and sub-titles, turn them into questions. View visual aids and read their captions.
Questions
While doing all of these steps, add questions. Ensure to answer on a separate page from the original questions.
Read
Focus on answering the questions, come up with more as necessary.
Write
Annotate thoughts and ideas Answer qeustions
Recite
Go back over appropriate sections
Reflect
How does this currently fit with what you know? How would you teach this to someone else?