RSSCompTIA Security+ SY0-501

Asymmetric Algorithms – CompTIA Security+ SY0-501 – 6.2

Asymmetric Algorithms – CompTIA Security+ SY0-501 – 6.2

| January 23, 2018

Asymmetric encryption has enabled the exchange of symmetric keys, encryption of data, digital signatures, and other significant security features. In this video, you’ll learn about these asymmetric algorithms and their use. << Previous Video: Block Cipher Modes Next: Hashing Algorithms >> One popular form of asymmetric cryptography is the Diffie-Hellman key exchange. This key exchange […]

Continue Reading

Block Cipher Modes – CompTIA Security+ SY0-501 – 6.2

Block Cipher Modes – CompTIA Security+ SY0-501 – 6.2

| January 23, 2018

Encrypting a block of data can be accomplished using a number of different methods. In this video, you’ll learn about block cipher modes and how these modes operate. << Previous Video: Symmetric Algorithms Next: Asymmetric Algorithms >> One way of encrypting data is encrypting a block of information at a time. We would take a […]

Continue Reading

Symmetric Algorithms – CompTIA Security+ SY0-501 – 6.2

Symmetric Algorithms – CompTIA Security+ SY0-501 – 6.2

| January 23, 2018

Symmetric ciphers are some of the most commonly used encryption methods on the Internet. In this video, you’ll learn about DES, 3DES, RC4, AES, Blowfish, and Twofish. << Previous Video: Common Cryptography Use Cases Next: Block Cipher Modes >> DES, or the Data Encryption Standard, was one of the most popular symmetric encryption algorithms in […]

Continue Reading

Cryptography Use Cases – CompTIA Security+ SY0-501 – 6.1

Cryptography Use Cases – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

We use cryptography for many different purposes. In this video, you’ll learn about some of the most common cryptography use cases. << Previous Video: Perfect Forward Secrecy Next: Symmetric Algorithms >> One of the challenges we have with today’s mobile devices is we’re limited by the amount of battery that we currently have available. There […]

Continue Reading

Perfect Forward Secrecy – CompTIA Security+ SY0-501 – 6.1

Perfect Forward Secrecy – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

Traditional web server encryption has relied on a single private key to provide confidentiality. In this video, you’ll learn about the alternative of perfect forward secrecy. << Previous Video: States of Data Next: Common Cryptography Use Cases >> When our browser is communicating to a web server over an encrypted channel it’s using SSL, or […]

Continue Reading

States of Data – CompTIA Security+ SY0-501 – 6.1

States of Data – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

Data can reside in a few different states. In this video, you’ll learn about data in-transit, data at-rest, and data in-use. << Previous Video: Stream and Block Ciphers Next: Perfect Forward Secrecy >> Data in-transit is any data that we’re sending across the network. You may also hear this referred to as data in-motion. By […]

Continue Reading

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

It’s common to use encryption methods that best suit the task at hand. In this video, you’ll learn about the differences between stream ciphers and block ciphers. << Previous Video: Steganography Next: States of Data >> We communicate across the network in different ways. And because of this, we use different types of encryption, depending […]

Continue Reading

Steganography – CompTIA Security+ SY0-501 – 6.1

Steganography – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

Sometimes, the information you need is hidden in plain sight. In this video, you’ll learn how steganography can be used to store and hide information. << Previous Video: Cryptographic Keys Next: Stream and Block Ciphers >> The process of obfuscation is when you take one particular topic and you make it much more complex to […]

Continue Reading

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

The keys used in cryptography may consist of many different characteristics. In this video, you’ll learn about key strength, the key exchange process, and real-time encryption and decryption. << Previous Video: Weak Encryption Next: Steganography >> Cryptography doesn’t rely on security through obscurity. With cryptography, you know practically everything about the cryptographic process. The entire […]

Continue Reading

Weak Encryption – CompTIA Security+ SY0-501 – 6.1

Weak Encryption – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

Not all encryption is equally secure. In this video, you’ll learn what makes an encryption method strong or weak. << Previous Video: Randomizing Cryptography Next: Cryptographic Keys >> When you start comparing different kinds of cryptography, you’ll find that some we refer to as strong cryptography, and others might be considered weak cryptography. We make […]

Continue Reading

X