Skip navigation

Key exchange

Key exchange: CISSP Cert Prep: 3 Security Engineering
Key exchange: CISSP Cert Prep: 3 Security Engineering

Before the sender and receiver can begin to communicate using a symmetric algorithm, they must somehow agree upon and exchange the shared secret key that they will use for that communication session. In this video, learn about the process of key exchange, including the difference between in-band and out-of-band key exchange.

Resume Transcript Auto-Scroll
Skill Level Advanced
4h 19m
Duration
94,654
Views
Show More Show Less
Skills covered in this course
Security Virtualization Cloud Computing IT CISSP

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now