RSSCompTIA Security+ SY0-401

Transport Encryption Algorithms – CompTIA Security+ SY0-401: 6.2

Transport Encryption Algorithms – CompTIA Security+ SY0-401: 6.2

| September 23, 2014 | 0 Comments

We use a number of algorithms to maintain the security of our data as it flows across the network. In this video, you’ll learn about SSL, SSH, and IPsec encryption protocols.

Continue Reading

NTLM – CompTIA Security+ SY0-401: 6.2

NTLM – CompTIA Security+ SY0-401: 6.2

| September 23, 2014 | 0 Comments

NTLM has been used to encrypt user authentication details in the Microsoft operating systems. In this video, you’ll learn about the history of NTLM and how the password information was stored in Windows.

Continue Reading

One-Time Pads – CompTIA Security+ SY0-401: 6.2

One-Time Pads – CompTIA Security+ SY0-401: 6.2

| September 23, 2014 | 0 Comments

Encrypting with a one-time pad is a very strong encryption technique. In this video, I’ll demonstrate how you can use a one-time pad to encrypt your data.

Continue Reading

Asymmetric Cryptography Algorithms – CompTIA Security+ SY0-401: 6.2

Asymmetric Cryptography Algorithms – CompTIA Security+ SY0-401: 6.2

| September 23, 2014 | 0 Comments

Asymmetric cryptography has enabled secure communication, digital signatures, and much more. In this video, you’ll learn about the well-known asymmetric algorithms of RSA and Diffie-Hellman.

Continue Reading

Symmetric Encryption Ciphers – CompTIA Security+ SY0-401: 6.2

Symmetric Encryption Ciphers – CompTIA Security+ SY0-401: 6.2

| September 23, 2014 | 0 Comments

The speed of symmetric encryption makes it a good choice for our high-speed networks. In this video, you’ll learn about RC4, DES, 3DES, AES, Blowfish, and Twofish.

Continue Reading

Cryptographic Hash Functions – CompTIA Security+ SY0-401: 6.2

Cryptographic Hash Functions – CompTIA Security+ SY0-401: 6.2

| September 23, 2014 | 0 Comments

There are many hash functions for many different circumstances. In this video, you’ll learn about MD5, SHA, RIPEMD, and HMAC hash functions.

Continue Reading

WEP vs. WPA – CompTIA Security+ SY0-401: 6.2

WEP vs. WPA – CompTIA Security+ SY0-401: 6.2

| September 22, 2014 | 0 Comments

802.11 networks rely on encryption to ensure the security of all wireless traffic. In this video, you’ll learn about WEP and WPA encryption and the dangers of using the wrong encryption on your wireless network.

Continue Reading

Perfect Forward Secrecy – CompTIA Security+ SY0-401: 6.1

Perfect Forward Secrecy – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

When a web server uses a single private key to encrypt all communication, then all communication can potentially be decrypted afterwards with this single bit of data. In this video, you’ll learn how perfect forward secrecy can be used to create encryption keys dynamically for every encrypted session.

Continue Reading

Elliptic Curve and Quantum Cryptography – CompTIA Security+ SY0-401: 6.1

Elliptic Curve and Quantum Cryptography – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

The creation and use of cryptography has also included new ways to keep our data private. In this video, you’ll learn about the use of elliptic curves to create encryption keys and how quantum cryptography can be used for spy-proof secure channels.

Continue Reading

Steganography – CompTIA Security+ SY0-401: 6.1

Steganography – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

When sending encrypted data, is usually very clear that the information transfer has been obfuscated. In this video, you’ll learn how steganography can be used to send information through covert, and sometimes unexpected, channels.

Continue Reading

X
My free Security+ Study Group is Wednesday. Click here to register!
My free Live Network+ Study Group is Wednesday. Click here to register!