CompTIA Security+ SY0-601

Hashing and Digital Signatures – SY0-601 CompTIA Security+ : 2.8

We use hashing and digital signatures extensively to ensure safe and secure data transfers. In this video, you’ll learn about hashing data, salting a hash, and creating a verifying digital signatures. << Previous Video: Symmetric and Asymmetric Cryptography Next: Cryptographic Keys >>   A hash is designed to take any type of input, whether that’s …

Hashing and Digital Signatures – SY0-601 CompTIA Security+ : 2.8 Read More »

Symmetric and Asymmetric Cryptography – SY0-601 CompTIA Security+ : 2.8

Symmetric and asymmetric cryptography are the fundamentals of our data security. In this video, you’ll learn about symmetric encryption, asymmetric encryption, creating the key pair, and sending data securely using both symmetric and asymmetric cryptography. << Previous Video: Cryptography Concepts Next: Hashing and Digital Signatures >> Let’s begin our conversation of the differences between symmetric …

Symmetric and Asymmetric Cryptography – SY0-601 CompTIA Security+ : 2.8 Read More »

Cryptography Concepts – SY0-601 CompTIA Security+ : 2.8

The fundamentals of cryptography apply to many aspects of IT security. In this video, you’ll learn about cryptographic concepts such as keys, lightweight cryptography, key stretching, and homomorphic encryption. << Previous Video: Secure Data Destruction Next: Symmetric and Asymmetric Cryptography >>   The word cryptography is derived from the Greek word kryptos, which means hidden …

Cryptography Concepts – SY0-601 CompTIA Security+ : 2.8 Read More »

Secure Data Destruction – SY0-601 CompTIA Security+ : 2.7

There are many ways to permanently remove data from a storage device. In this video, you’ll learn about physical destruction, purging data, and data wiping. << Previous Video: Secure Areas Next: Cryptography Concepts >>   As a security professional, you’ll be tasked with knowing what data can be destroyed and what data must not be …

Secure Data Destruction – SY0-601 CompTIA Security+ : 2.7 Read More »

Physical Security Controls – SY0-601 CompTIA Security+ : 2.7

We often focus on digital technologies to protect our networks, but there are many physical devices that can provide additional security. In this video, you’ll learn about access control vestibules, alarms, signs, industrial camouflage, and more. << Previous Video: Embedded Systems Constraints Next: Secure Areas >>   If you would like to limit the access …

Physical Security Controls – SY0-601 CompTIA Security+ : 2.7 Read More »

Embedded Systems Constraints – SY0-601 CompTIA Security+ : 2.6

There are advantages and disadvantages when using embedded systems. In this video, you’ll learn about the limitations associated with power, networking, upgradability, patching, and more. << Previous Video: Embedded Systems Communication Next: Physical Security Controls >>   One of the challenges you have with embedded systems is they’re usually running on a device that is …

Embedded Systems Constraints – SY0-601 CompTIA Security+ : 2.6 Read More »

Embedded Systems Communication – SY0-601 CompTIA Security+ : 2.6

Embedded systems can use many different methods for communication. In this video, you’ll learn how embedded systems use 5G, narrowband, baseband, and Zigbee networks. << Previous Video: Embedded Systems Next: Embedded Systems Constraints >>     With the increasing number of embedded systems that are being deployed, it’s important to know how these devices communicate …

Embedded Systems Communication – SY0-601 CompTIA Security+ : 2.6 Read More »