RSSCompTIA Security+ SY0-501

Symmetric Algorithms – CompTIA Security+ SY0-501 – 6.2

Symmetric Algorithms – CompTIA Security+ SY0-501 – 6.2

Last modified on February 1st, 2018 at 12:18 pm

Symmetric ciphers are some of the most commonly used encryption methods on the Internet. In this video, you’ll learn about DES, 3DES, RC4, AES, Blowfish, and Twofish. << Previous Video: Common Cryptography Use Cases Next: Block Cipher Modes >> DES, or the Data Encryption Standard, was one of the most popular symmetric encryption algorithms in […]

Continue Reading

Cryptography Use Cases – CompTIA Security+ SY0-501 – 6.1

Cryptography Use Cases – CompTIA Security+ SY0-501 – 6.1

Last modified on February 1st, 2018 at 12:17 pm

We use cryptography for many different purposes. In this video, you’ll learn about some of the most common cryptography use cases. << Previous Video: Perfect Forward Secrecy Next: Symmetric Algorithms >> One of the challenges we have with today’s mobile devices is we’re limited by the amount of battery that we currently have available. There […]

Continue Reading

Perfect Forward Secrecy – CompTIA Security+ SY0-501 – 6.1

Perfect Forward Secrecy – CompTIA Security+ SY0-501 – 6.1

Last modified on February 1st, 2018 at 12:15 pm

Traditional web server encryption has relied on a single private key to provide confidentiality. In this video, you’ll learn about the alternative of perfect forward secrecy. << Previous Video: States of Data Next: Common Cryptography Use Cases >> When our browser is communicating to a web server over an encrypted channel it’s using SSL, or […]

Continue Reading

States of Data – CompTIA Security+ SY0-501 – 6.1

States of Data – CompTIA Security+ SY0-501 – 6.1

Last modified on February 1st, 2018 at 12:14 pm

Data can reside in a few different states. In this video, you’ll learn about data in-transit, data at-rest, and data in-use. << Previous Video: Stream and Block Ciphers Next: Perfect Forward Secrecy >> Data in-transit is any data that we’re sending across the network. You may also hear this referred to as data in-motion. By […]

Continue Reading

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1

Last modified on February 1st, 2018 at 12:13 pm

It’s common to use encryption methods that best suit the task at hand. In this video, you’ll learn about the differences between stream ciphers and block ciphers. << Previous Video: Steganography Next: States of Data >> We communicate across the network in different ways. And because of this, we use different types of encryption, depending […]

Continue Reading

Steganography – CompTIA Security+ SY0-501 – 6.1

Steganography – CompTIA Security+ SY0-501 – 6.1

Last modified on February 7th, 2018 at 11:34 am

Sometimes, the information you need is hidden in plain sight. In this video, you’ll learn how steganography can be used to store and hide information. << Previous Video: Cryptographic Keys Next: Stream and Block Ciphers >> The process of obfuscation is when you take one particular topic and you make it much more complex to […]

Continue Reading

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

Last modified on February 1st, 2018 at 12:12 pm

The keys used in cryptography may consist of many different characteristics. In this video, you’ll learn about key strength, the key exchange process, and real-time encryption and decryption. << Previous Video: Weak Encryption Next: Steganography >> Cryptography doesn’t rely on security through obscurity. With cryptography, you know practically everything about the cryptographic process. The entire […]

Continue Reading

Weak Encryption – CompTIA Security+ SY0-501 – 6.1

Weak Encryption – CompTIA Security+ SY0-501 – 6.1

Last modified on February 7th, 2018 at 11:33 am

Not all encryption is equally secure. In this video, you’ll learn what makes an encryption method strong or weak. << Previous Video: Randomizing Cryptography Next: Cryptographic Keys >> When you start comparing different kinds of cryptography, you’ll find that some we refer to as strong cryptography, and others might be considered weak cryptography. We make […]

Continue Reading

Randomizing Cryptography – CompTIA Security+ SY0-501 – 6.1

Randomizing Cryptography – CompTIA Security+ SY0-501 – 6.1

Last modified on February 1st, 2018 at 12:11 pm

We rely heavily on randomization when using cryptography. In this video, you’ll learn about the importance of randomization and how random information is used to provide data security. << Previous Video: Hashing and Digital Signatures Next: Weak Encryption >> In an earlier video, I talked about encryption relying on randomisation. And here’s a good example. […]

Continue Reading

Hashing and Digital Signatures – CompTIA Security+ SY0-501 – 6.1

Hashing and Digital Signatures – CompTIA Security+ SY0-501 – 6.1

Last modified on February 1st, 2018 at 12:09 pm

A cryptographic hash can be used for many different tasks. In this video, you’ll learn about hashing, collisions, digital signatures, and more. << Previous Video: Symmetric and Asymmetric Encryption Next: Randomizing Cryptography >> A cryptographic hash allows you to take any amount of data– it can be a small bit of text, or it can […]

Continue Reading

X