Tag: encryption

Troubleshooting Wireless Configurations – CompTIA Network+ N10-006 – 4.3

Troubleshooting Wireless Configurations – CompTIA Network+ N10-006 – 4.3

| May 8, 2015 | 0 Comments

The configuration of your wireless access point can have a dramatic impact on throughput and performance. In this video, you’ll learn about SSID configurations, encryption settings, power levels, LWAPP, environmental factors, and issues with wireless standards.

Continue Reading

Wireless Security – CompTIA Network+ N10-006 – 3.3

Wireless Security – CompTIA Network+ N10-006 – 3.3

| May 2, 2015 | 0 Comments

We relay on wireless security technologies to keep our network communication secure. In this video, you’ll learn about WEP, WPA, WPA2, and MAC filtering.

Continue Reading

Permission granted, Mr. Bond

Permission granted, Mr. Bond

| November 25, 2014

Which of these wireless encryption types include centralized authentication?

Continue Reading

Look, another email about meteor showers

Look, another email about meteor showers

| November 17, 2014

Which of these ports commonly transfers encrypted data?

Continue Reading

Isthay an’tcay ossiblypay ebay away oodgay ideaway

Isthay an’tcay ossiblypay ebay away oodgay ideaway

| November 4, 2014

Which of these would be the best encryption type to use on a wireless network?

Continue Reading

Symmetric Encryption Ciphers – CompTIA Security+ SY0-401: 6.2

Symmetric Encryption Ciphers – CompTIA Security+ SY0-401: 6.2

| September 23, 2014 | 0 Comments

The speed of symmetric encryption makes it a good choice for our high-speed networks. In this video, you’ll learn about RC4, DES, 3DES, AES, Blowfish, and Twofish.

Continue Reading

Perfect Forward Secrecy – CompTIA Security+ SY0-401: 6.1

Perfect Forward Secrecy – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

When a web server uses a single private key to encrypt all communication, then all communication can potentially be decrypted afterwards with this single bit of data. In this video, you’ll learn how perfect forward secrecy can be used to create encryption keys dynamically for every encrypted session.

Continue Reading

Elliptic Curve and Quantum Cryptography – CompTIA Security+ SY0-401: 6.1

Elliptic Curve and Quantum Cryptography – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

The creation and use of cryptography has also included new ways to keep our data private. In this video, you’ll learn about the use of elliptic curves to create encryption keys and how quantum cryptography can be used for spy-proof secure channels.

Continue Reading

Steganography – CompTIA Security+ SY0-401: 6.1

Steganography – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

When sending encrypted data, is usually very clear that the information transfer has been obfuscated. In this video, you’ll learn how steganography can be used to send information through covert, and sometimes unexpected, channels.

Continue Reading

Key Escrow – CompTIA Security+ SY0-401: 6.1

Key Escrow – CompTIA Security+ SY0-401: 6.1

| September 21, 2014 | 0 Comments

In large environments, your encryption keys may be held by a third-party to ensure that the encrypted data can always be recovered. In this video, you’ll learn about key escrow and some of the business cases where key escrow should be used.

Continue Reading

X