Professor Messer

James "Professor" Messer is the President and Chief Explainer of ProfessorMesser.com.

rss feed Author's Website

Professor Messer's Latest Posts

Cryptography Use Cases – CompTIA Security+ SY0-501 – 6.1

Cryptography Use Cases – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

We use cryptography for many different purposes. In this video, you’ll learn about some of the most common cryptography use cases. << Previous Video: Perfect Forward Secrecy

Continue Reading

Perfect Forward Secrecy – CompTIA Security+ SY0-501 – 6.1

Perfect Forward Secrecy – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

Traditional web server encryption has relied on a single private key to provide confidentiality. In this video, you’ll learn about the alternative of perfect forward secrecy. << Previous Video: States of Data Next: Common Cryptography Use Cases >>

Continue Reading

States of Data – CompTIA Security+ SY0-501 – 6.1

States of Data – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

Data can reside in a few different states. In this video, you’ll learn about data in-transit, data at-rest, and data in-use. << Previous Video: Stream and Block Ciphers Next: Perfect Forward Secrecy >>

Continue Reading

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

It’s common to use encryption methods that best suit the task at hand. In this video, you’ll learn about the differences between stream ciphers and block ciphers. << Previous Video: Steganography Next: States of Data >>

Continue Reading

Steganography – CompTIA Security+ SY0-501 – 6.1

Steganography – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

Sometimes, the information you need is hidden in plain sight. In this video, you’ll learn how steganography can be used to store and hide information. << Previous Video: Cryptographic Keys Next: Stream and Block Ciphers >>

Continue Reading

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

The keys used in cryptography may consist of many different characteristics. In this video, you’ll learn about key strength, the key exchange process, and real-time encryption and decryption. << Previous Video: Weak Encryption Next: Steganography >>

Continue Reading

Weak Encryption – CompTIA Security+ SY0-501 – 6.1

Weak Encryption – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

Not all encryption is equally secure. In this video, you’ll learn what makes an encryption method strong or weak. << Previous Video: Randomizing Cryptography Next: Cryptographic Keys >>

Continue Reading

Randomizing Cryptography – CompTIA Security+ SY0-501 – 6.1

Randomizing Cryptography – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

We rely heavily on randomization when using cryptography. In this video, you’ll learn about the importance of randomization and how random information is used to provide data security. << Previous Video: Hashing and Digital Signatures Next: Weak Encryption >>

Continue Reading

Hashing and Digital Signatures – CompTIA Security+ SY0-501 – 6.1

Hashing and Digital Signatures – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

A cryptographic hash can be used for many different tasks. In this video, you’ll learn about hashing, collisions, digital signatures, and more. << Previous Video: Symmetric and Asymmetric Encryption Next: Randomizing Cryptography >>

Continue Reading

Symmetric and Asymmetric Encryption – CompTIA Security+ SY0-501 – 6.1

Symmetric and Asymmetric Encryption – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

If you’re planning to implement cryptography, then you’ll probably be using either symmetric encryption or asymmetric encryption. In this video, you’ll learn about both of these valuable encryption mechanisms. << Previous Video: Cryptography Concepts Next: Hashing and Digital Signatures >>

Continue Reading

X