Professor Messer’s CompTIA A+ Study Group – September 2014
This month, there’s more live Q&A and I answer your questions in the after-show. The A+ Study Group After-Show
Professor Messer’s CompTIA A+ Study Group – September 2014 Read More »
This month, there’s more live Q&A and I answer your questions in the after-show. The A+ Study Group After-Show
Professor Messer’s CompTIA A+ Study Group – September 2014 Read More »
When a web server uses a single private key to encrypt all communication, then all communication can potentially be decrypted afterwards with this single bit of data. In this video, you’ll learn how perfect forward secrecy can be used to create encryption keys dynamically for every encrypted session.
Perfect Forward Secrecy – CompTIA Security+ SY0-401: 6.1 Read More »
The creation and use of cryptography has also included new ways to keep our data private. In this video, you’ll learn about the use of elliptic curves to create encryption keys and how quantum cryptography can be used for spy-proof secure channels.
Elliptic Curve and Quantum Cryptography – CompTIA Security+ SY0-401: 6.1 Read More »
When sending encrypted data, is usually very clear that the information transfer has been obfuscated. In this video, you’ll learn how steganography can be used to send information through covert, and sometimes unexpected, channels.
In large environments, your encryption keys may be held by a third-party to ensure that the encrypted data can always be recovered. In this video, you’ll learn about key escrow and some of the business cases where key escrow should be used.
Hashing functions can provide us with some interesting ways of validating data. In this video, you’ll learn the fundamentals of hashing and I’ll demonstrate how you can validate a downloaded file by calculating a hash.
Our encryption technologies not only provide a secure channel of communication, but they can also prove that the data we’re receiving has not been changed between endpoints. In this video, you’ll learn about non-repudiation and how digital signatures can ensure the integrity and authenticity of our data.
Non-Repudiation – CompTIA Security+ SY0-401: 6.1 Read More »
Encrypting files is important, but our network communication also requires additional privacy. In this video, you’ll learn about the cryptographic techniques used to secure our network connections.
Transport Encryption – CompTIA Security+ SY0-401: 6.1 Read More »
Some data transfer methods will encrypt data one byte at a time or in groups of larger data blocks. In this video, you’ll learn how block ciphers combine data encryption with speed and efficiency.
Block vs. Stream Ciphers – CompTIA Security+ SY0-401: 6.1 Read More »