CompTIA Security+ SY0-601

Cryptographic Keys – SY0-601 CompTIA Security+ : 2.8

Our cryptographic keys are often the only unknown variable when protecting data or creating digital signatures. In this video, you’ll learn about key strength, key exchange, and how to protect different sessions with dynamic keys. << Previous Video: Hashing and Digital Signatures Next: Steganography >>  

Hashing and Digital Signatures – SY0-601 CompTIA Security+ : 2.8

We use hashing and digital signatures extensively to ensure safe and secure data transfers. In this video, you’ll learn about hashing data, salting a hash, and creating a verifying digital signatures. << Previous Video: Symmetric and Asymmetric Cryptography Next: Cryptographic Keys >>  

Symmetric and Asymmetric Cryptography – SY0-601 CompTIA Security+ : 2.8

Symmetric and asymmetric cryptography are the fundamentals of our data security. In this video, you’ll learn about symmetric encryption, asymmetric encryption, creating the key pair, and sending data securely using both symmetric and asymmetric cryptography. << Previous Video: Cryptography Concepts Next: Hashing and Digital Signatures >>  

Cryptography Concepts – SY0-601 CompTIA Security+ : 2.8

The fundamentals of cryptography apply to many aspects of IT security. In this video, you’ll learn about cryptographic concepts such as keys, lightweight cryptography, key stretching, and homomorphic encryption. << Previous Video: Secure Data Destruction Next: Symmetric and Asymmetric Cryptography >>  

Secure Areas – SY0-601 CompTIA Security+ : 2.7

The security of a network can sometimes be related to a physical location. In this video, you’ll learn about air gaps, vaults, safe, and hot and cold aisles. << Previous Video: Physical Security Controls Next: Secure Data Destruction >>  

Physical Security Controls – SY0-601 CompTIA Security+ : 2.7

We often focus on digital technologies to protect our networks, but there are many physical devices that can provide additional security. In this video, you’ll learn about access control vestibules, alarms, signs, industrial camouflage, and more. << Previous Video: Embedded Systems Constraints Next: Secure Areas >>