Key Revocation – CompTIA Security+ SY0-401: 6.3
An encryption key may need to be revoked for many reasons. In this video, you’ll learn about automated key revocation and how to revoke keys in a web-of-trust.
An encryption key may need to be revoked for many reasons. In this video, you’ll learn about automated key revocation and how to revoke keys in a web-of-trust.
Our browser encryption relies on certificate authorities to maintain the trust of your certificates. In this video, you’ll learn how certificate authorities are used on our computers and the differences between a commercial CA and a private CA.
Certificate Authorities – CompTIA Security+ SY0-401: 6.3 Read More »
Not all encryption algorithms are alike, and some are much better than others. In this video, you’ll learn how to evaluate encryption strength and how developers can use the bcrypt library to generate secure hashes.
Strong vs. Weak Encryption – CompTIA Security+ SY0-401: 6.2 Read More »
We use a number of algorithms to maintain the security of our data as it flows across the network. In this video, you’ll learn about SSL, SSH, and IPsec encryption protocols.
Transport Encryption Algorithms – CompTIA Security+ SY0-401: 6.2 Read More »
NTLM has been used to encrypt user authentication details in the Microsoft operating systems. In this video, you’ll learn about the history of NTLM and how the password information was stored in Windows.
Encrypting with a one-time pad is a very strong encryption technique. In this video, I’ll demonstrate how you can use a one-time pad to encrypt your data.
Asymmetric cryptography has enabled secure communication, digital signatures, and much more. In this video, you’ll learn about the well-known asymmetric algorithms of RSA and Diffie-Hellman.
Asymmetric Cryptography Algorithms – CompTIA Security+ SY0-401: 6.2 Read More »
The speed of symmetric encryption makes it a good choice for our high-speed networks. In this video, you’ll learn about RC4, DES, 3DES, AES, Blowfish, and Twofish.
Symmetric Encryption Ciphers – CompTIA Security+ SY0-401: 6.2 Read More »
There are many hash functions for many different circumstances. In this video, you’ll learn about MD5, SHA, RIPEMD, and HMAC hash functions.
Cryptographic Hash Functions – CompTIA Security+ SY0-401: 6.2 Read More »