Category IT Security

How to get GISP Certification

GIAC Information Security Professional (GISP) is an IT certification provided by Global Information Assurance Certification (GIAC), that is linked to training courses provided by SANS. Do not confuse GIAC’s GISP with another certification related to GIS that shares the same…

Password Hashing Algorithms

Password hashing algorithms: PBKDF Family PBKDF1 PBKDF2 bcrypt scrypt List of Password Hashing Algorithms PBKDF1 Deprecated. PBKDF2 Supersedes PBKDF1. Use key stretching to increase the difficulty of attack. bcrypt Use key stretching to increase the difficulty of attack. scrypt Use…

Cryptographic Modes of Operation

Block ciphers are cryptographic algorithms that encrypt fixed-size blocks of data A cryptographic mode of operation for a block cipher describes the different ways that cryptographic algorithm may transform data to achieve sufficient complexity that offer protection against attacks. This…

How to prepare CISSP Exam

CISSP (Certified Information Systems Security Professional) is a certification granted by the organization ISC2 (International Information System Security Certification Consortium). This post explains how you can prepare the exam to apply for CISSP certification. To find more information about the…

Digital Certificates

Digital certificates, also known as public key certificates or identity certificate. When I explain what a digital certificate to someone without a strong IT background I like to compare it with a seal ring, like the ones used in medieval…

How to get CISSP Certification

CISSP (Certified Information Systems Security Professional) is an information security certification granted by organization (ISC)2. This post explains the procedure to get CISSP certification through a series of frequently asked questions (FAQs) that are set in logical order. All questions…