RSSCompTIA Security+ SY0-501

Types of Certificates – CompTIA Security+ SY0-501 – 6.4

Types of Certificates – CompTIA Security+ SY0-501 – 6.4

| January 23, 2018

As a security professional, you’ll manage many different certificate types. In this video, you’ll learn about root certificates, SSL certificates, self-signed certs, and more. << Previous Video: PKI Concepts As a security professional, there are a number of different certificates that you'll use every day for many different purposes. In this video, we'll look at…

Continue Reading

Certificate File Formats – CompTIA Security+ SY0-501 – 6.4

Certificate File Formats – CompTIA Security+ SY0-501 – 6.4

| January 23, 2018

Certificates can be delivered and transferred between systems in a variety of different formats. In this video, you’ll learn about some of the most common certificate file formats. << Previous Video: Types of Certificates Next: Security+ SY0-501 Course Index >> In our previous videos, we saw that an X.509 certificate has a very standard format.…

Continue Reading

PKI Concepts – CompTIA Security+ SY0-501 – 6.4

PKI Concepts – CompTIA Security+ SY0-501 – 6.4

| January 23, 2018

The details of a public key infrastructure are sometimes the most important pieces. In this video, you’ll learn about online and offline CAs, OCSP stapling, certificate pinning, and more. << Previous Video: PKI Components Next: Types of Certificates >> Our public key infrastructures rely on trust. Usually this trust is provided by a certificate authority.…

Continue Reading

PKI Components – CompTIA Security+ SY0-501 – 6.4

PKI Components – CompTIA Security+ SY0-501 – 6.4

| January 23, 2018

Creating a public key infrastructure requires extensive planning. In this video, you’ll learn about the most important components required to build a successful PKI. << Previous Video: Wireless Security Next: PKI Concepts >> "PKI" stands for Public Key Infrastructure. And it's a way to describe the policies, the procedure, the hardware, the software, and the…

Continue Reading

Wireless Security – CompTIA Security+ SY0-501 – 6.3

Wireless Security – CompTIA Security+ SY0-501 – 6.3

| January 23, 2018

There are many different methods of providing wireless security. In this video, you’ll learn about wireless security modes, captive ports, and WPS. << Previous Video: Wireless Authentication Protocols Next: PKI Components >> If you're configuring a wireless access point at your home or at your office, you may have a number of different options available…

Continue Reading

Wireless Authentication Protocols – CompTIA Security+ SY0-501 – 6.3

Wireless Authentication Protocols – CompTIA Security+ SY0-501 – 6.3

| January 23, 2018

Gaining access to a wireless network may take a number of different paths. In this video, you’ll learn about the authentication protocols used to provide authentication to wireless networks. << Previous Video: Wireless Cryptographic Protocols Next: Wireless Security >> We know that encrypting our data on a wireless network is important. But we also need…

Continue Reading

Wireless Cryptographic Protocols – CompTIA Security+ SY0-501 – 6.3

Wireless Cryptographic Protocols – CompTIA Security+ SY0-501 – 6.3

| January 23, 2018

We rely on strong encryption protocols to keep our wireless communications secure. In this video, you’ll learn about the security features associated with WPA and WPA2. << Previous Video: Obfuscation Next: Wireless Authentication Protocols >> Unlike a wired network connection, wireless networks can be heard by anyone who's close by who would care to listen…

Continue Reading

Obfuscation – CompTIA Security+ SY0-501 – 6.2

Obfuscation – CompTIA Security+ SY0-501 – 6.2

| January 23, 2018

One way to slow down an attacker is to make things unclear. In this video, you’ll learn about some common implementations of obfuscation. << Previous Video: Key Stretching Algorithms Next: Wireless Cryptographic Protocols >> What if you didn't want to encrypt information but you still wanted to make it a little bit more difficult to…

Continue Reading

Key Stretching Algorithms – CompTIA Security+ SY0-501 – 6.2

Key Stretching Algorithms – CompTIA Security+ SY0-501 – 6.2

| January 23, 2018

One way to extend the capabilities of a relatively small key size is to implement key stretching. In this video, you’ll learn about the libraries that application developers can use to stretch their keys. << Previous Video: Hashing Algorithms Next: Obfuscation >> When we're implementing encryption in our applications, we may find that the encryption…

Continue Reading

Hashing Algorithms – CompTIA Security+ SY0-501 – 6.2

Hashing Algorithms – CompTIA Security+ SY0-501 – 6.2

| January 23, 2018

There are many methods and implementations of cryptographic hashing. In this video, you’ll learn about some of the most popular hashing algorithms. << Previous Video: Asymmetric Algorithms Next: Key Stretching Algorithms >> One type of hash that's been around for a while but you'll still see it in use today is MD5, or the MD5…

Continue Reading

X