SY0-601 Videos

Stream and Block Ciphers – SY0-601 CompTIA Security+ : 2.8

We use stream and block ciphers to efficiently protect our important data. In this video, you’ll learn about stream cipher methods and block cipher modes of operation. << Previous Video: Quantum Computing Next: Blockchain Technology >> When you want to encrypt some information, there are a number of different techniques you can use to take […]

Stream and Block Ciphers – SY0-601 CompTIA Security+ : 2.8 Read More »

Quantum Computing – SY0-601 CompTIA Security+ : 2.8

Quantum computing is quickly changing our perspective on technology and cryptography. In this video, you’ll learn the basics of quantum computing and how our cryptography changes when using quantum computing. << Previous Video: Steganography Next: Stream and Block Ciphers >>   An emerging technology in computing is quantum computing. This is computing based on quantum

Quantum Computing – SY0-601 CompTIA Security+ : 2.8 Read More »

Steganography – SY0-601 CompTIA Security+ : 2.8

It’s sometimes easier to transfer secret information through the use of a concealment. In this video, you’ll learn about obfuscation, steganography, and how to hide data inside of image, audio, and video files. << Previous Video: Cryptographic Keys Next: Quantum Computing >>   Obfuscation is the process of taking something that would commonly be relatively

Steganography – SY0-601 CompTIA Security+ : 2.8 Read More »

Cryptographic Keys – SY0-601 CompTIA Security+ : 2.8

Our cryptographic keys are often the only unknown variable when protecting data or creating digital signatures. In this video, you’ll learn about key strength, key exchange, and how to protect different sessions with dynamic keys. << Previous Video: Hashing and Digital Signatures Next: Steganography >>   Cryptography is an interesting science because it allows us

Cryptographic Keys – SY0-601 CompTIA Security+ : 2.8 Read More »

Hashing and Digital Signatures – SY0-601 CompTIA Security+ : 2.8

We use hashing and digital signatures extensively to ensure safe and secure data transfers. In this video, you’ll learn about hashing data, salting a hash, and creating a verifying digital signatures. << Previous Video: Symmetric and Asymmetric Cryptography Next: Cryptographic Keys >>   A hash is designed to take any type of input, whether that’s

Hashing and Digital Signatures – SY0-601 CompTIA Security+ : 2.8 Read More »

Symmetric and Asymmetric Cryptography – SY0-601 CompTIA Security+ : 2.8

Symmetric and asymmetric cryptography are the fundamentals of our data security. In this video, you’ll learn about symmetric encryption, asymmetric encryption, creating the key pair, and sending data securely using both symmetric and asymmetric cryptography. << Previous Video: Cryptography Concepts Next: Hashing and Digital Signatures >> Let’s begin our conversation of the differences between symmetric

Symmetric and Asymmetric Cryptography – SY0-601 CompTIA Security+ : 2.8 Read More »

Cryptography Concepts – SY0-601 CompTIA Security+ : 2.8

The fundamentals of cryptography apply to many aspects of IT security. In this video, you’ll learn about cryptographic concepts such as keys, lightweight cryptography, key stretching, and homomorphic encryption. << Previous Video: Secure Data Destruction Next: Symmetric and Asymmetric Cryptography >>   The word cryptography is derived from the Greek word kryptos, which means hidden

Cryptography Concepts – SY0-601 CompTIA Security+ : 2.8 Read More »

Physical Security Controls – SY0-601 CompTIA Security+ : 2.7

We often focus on digital technologies to protect our networks, but there are many physical devices that can provide additional security. In this video, you’ll learn about access control vestibules, alarms, signs, industrial camouflage, and more. << Previous Video: Embedded Systems Constraints Next: Secure Areas >>   If you would like to limit the access

Physical Security Controls – SY0-601 CompTIA Security+ : 2.7 Read More »