RSSCompTIA Security+ SY0-501

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

It’s common to use encryption methods that best suit the task at hand. In this video, you’ll learn about the differences between stream ciphers and block ciphers. << Previous Video: Steganography Next: States of Data >> We communicate across the network in different ways. And because of this, we use different types of encryption, depending […]

Continue Reading

Steganography – CompTIA Security+ SY0-501 – 6.1

Steganography – CompTIA Security+ SY0-501 – 6.1

| January 22, 2018

Sometimes, the information you need is hidden in plain sight. In this video, you’ll learn how steganography can be used to store and hide information. << Previous Video: Cryptographic Keys Next: Stream and Block Ciphers >> The process of obfuscation is when you take one particular topic and you make it much more complex to […]

Continue Reading

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

The keys used in cryptography may consist of many different characteristics. In this video, you’ll learn about key strength, the key exchange process, and real-time encryption and decryption. << Previous Video: Weak Encryption Next: Steganography >> Cryptography doesn’t rely on security through obscurity. With cryptography, you know practically everything about the cryptographic process. The entire […]

Continue Reading

Weak Encryption – CompTIA Security+ SY0-501 – 6.1

Weak Encryption – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

Not all encryption is equally secure. In this video, you’ll learn what makes an encryption method strong or weak. << Previous Video: Randomizing Cryptography Next: Cryptographic Keys >> When you start comparing different kinds of cryptography, you’ll find that some we refer to as strong cryptography, and others might be considered weak cryptography. We make […]

Continue Reading

Randomizing Cryptography – CompTIA Security+ SY0-501 – 6.1

Randomizing Cryptography – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

We rely heavily on randomization when using cryptography. In this video, you’ll learn about the importance of randomization and how random information is used to provide data security. << Previous Video: Hashing and Digital Signatures Next: Weak Encryption >> In an earlier video, I talked about encryption relying on randomisation. And here’s a good example. […]

Continue Reading

Hashing and Digital Signatures – CompTIA Security+ SY0-501 – 6.1

Hashing and Digital Signatures – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

A cryptographic hash can be used for many different tasks. In this video, you’ll learn about hashing, collisions, digital signatures, and more. << Previous Video: Symmetric and Asymmetric Encryption Next: Randomizing Cryptography >> A cryptographic hash allows you to take any amount of data– it can be a small bit of text, or it can […]

Continue Reading

Symmetric and Asymmetric Encryption – CompTIA Security+ SY0-501 – 6.1

Symmetric and Asymmetric Encryption – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

If you’re planning to implement cryptography, then you’ll probably be using either symmetric encryption or asymmetric encryption. In this video, you’ll learn about both of these valuable encryption mechanisms. << Previous Video: Cryptography Concepts Next: Hashing and Digital Signatures >> If you’ve implemented symmetric encryption using a single shared key for both the encryption process […]

Continue Reading

Cryptography Concepts – CompTIA Security+ SY0-501 – 6.1

Cryptography Concepts – CompTIA Security+ SY0-501 – 6.1

| January 21, 2018

The basics of cryptography are valuable fundamentals for building a secure network. In this video, you’ll learn about cryptographic terms, the value of the key, the concepts of confusion and diffusion, and more. << Previous Video: Data Roles and Retention Next: Symmetric and Asymmetric Encryption >> Cryptography is derived from the Greek word “kryptos,” which […]

Continue Reading

Data Roles and Retention – CompTIA Security+ SY0-501 – 5.8

Data Roles and Retention – CompTIA Security+ SY0-501 – 5.8

| January 20, 2018

Who owns your data, and how long do you keep copies of your data? In this video, you’ll learn about specific data roles and options for data retention. << Previous Video: Handling Sensitive Data Next: Cryptography Concepts >> In most organizations, data doesn’t exist on its own. There is a relationship between the data and […]

Continue Reading

Handling Sensitive Data – CompTIA Security+ SY0-501 – 5.8

Handling Sensitive Data – CompTIA Security+ SY0-501 – 5.8

| January 20, 2018

Different types of data need to be uniquely managed. In this video, you’ll learn about labeling sensitive data and some common sensitive data types. << Previous Video: Data Destruction Next: Data Roles and Retention >> In your organization, you’re going to be working with lots of different kinds of data. But not all of the […]

Continue Reading

X