RSSCompTIA Security+ SY0-401

Trust Models – CompTIA Security+ SY0-401: 6.3

Trust Models – CompTIA Security+ SY0-401: 6.3

| September 23, 2014 | 0 Comments

There are many ways to manage and validate the trust of our encryption keys. In this video, you’ll learn about using CAs, mesh relationships, web-of-trust, and mutual authentication.

Continue Reading

Key Escrow – CompTIA Security+ SY0-401: 6.3

Key Escrow – CompTIA Security+ SY0-401: 6.3

| September 23, 2014 | 0 Comments

The escrow of encryption keys can be a necessary process, but it isn’t without controversy. In this video, you’ll learn the advantages and disadvantages of escrowing your encryption keys.

Continue Reading

Key Registration – CompTIA Security+ SY0-401: 6.3

Key Registration – CompTIA Security+ SY0-401: 6.3

| September 23, 2014 | 0 Comments

If a key is going to be associated with a person, there must be a formal way to validate the association. In this video, you’ll learn about the best practices for registering and assigning encryption keys.

Continue Reading

Public and Private Keys – CompTIA Security+ SY0-401: 6.3

Public and Private Keys – CompTIA Security+ SY0-401: 6.3

| September 23, 2014 | 0 Comments

For asymmetric encryption, you’ll need the public and private key pair for successful encryption and decryption. In this video, I’ll demonstrate the creation of a public and private key pair.

Continue Reading

Key Recovery – CompTIA Security+ SY0-401: 6.3

Key Recovery – CompTIA Security+ SY0-401: 6.3

| September 23, 2014 | 0 Comments

If you lose your encryption key, you’ll lose access to all of your data. In this video, you’ll learn about key recovery techniques and how some certificate authorities can manage your encryption keys.

Continue Reading

Public Key Infrastructure – CompTIA Security+ SY0-401: 6.3

Public Key Infrastructure – CompTIA Security+ SY0-401: 6.3

| September 23, 2014 | 0 Comments

If you have a large number of devices using a public key infrastructure, you’ll need a way to manage all of the keys in the infrastructure. In this video, you’ll learn about public key infrastructures and the key management lifecycle.

Continue Reading

Digital Certificates – CompTIA Security+ SY0-401: 6.3

Digital Certificates – CompTIA Security+ SY0-401: 6.3

| September 23, 2014 | 0 Comments

We rely on digital certificates for much of the encryption that we use over the Internet. In this video, you’ll learn about digital certificates and what information is contained in a digital certificate.

Continue Reading

Key Revocation – CompTIA Security+ SY0-401: 6.3

Key Revocation – CompTIA Security+ SY0-401: 6.3

| September 23, 2014 | 0 Comments

An encryption key may need to be revoked for many reasons. In this video, you’ll learn about automated key revocation and how to revoke keys in a web-of-trust.

Continue Reading

Certificate Authorities – CompTIA Security+ SY0-401: 6.3

Certificate Authorities – CompTIA Security+ SY0-401: 6.3

| September 23, 2014 | 0 Comments

Our browser encryption relies on certificate authorities to maintain the trust of your certificates. In this video, you’ll learn how certificate authorities are used on our computers and the differences between a commercial CA and a private CA.

Continue Reading

Strong vs. Weak Encryption – CompTIA Security+ SY0-401: 6.2

Strong vs. Weak Encryption – CompTIA Security+ SY0-401: 6.2

| September 23, 2014 | 0 Comments

Not all encryption algorithms are alike, and some are much better than others. In this video, you’ll learn how to evaluate encryption strength and how developers can use the bcrypt library to generate secure hashes.

Continue Reading

X
My free Security+ Study Group is Wednesday. Click here to register!
My free Live Network+ Study Group is Wednesday. Click here to register!