CompTIA Security+ SY0-301: 6.2 – One-Time Pads
The one-time pad is a powerful symmetric encryption mechanism. In this video, you’ll learn the history of one-time pads and how you can use a one-time pad to encrypt your secret messages.
The one-time pad is a powerful symmetric encryption mechanism. In this video, you’ll learn the history of one-time pads and how you can use a one-time pad to encrypt your secret messages.
One of the most popular asymmetric encryption applications of all time is Pretty Good Privacy, and the OpenPGP compliant Gnu Privacy Guard is a commonly used implementation. In this video, you’ll learn about the use of asymmetric encryption in PGP and GPG.
CompTIA Security+ SY0-301: 6.2 – Asymmetric Encryption with PGP and GPG Read More »
Symmetric encryption is a fundamental method of protecting data. In this video, you’ll learn about symmetric ciphers such as RC4, DES, 3DES, AES, Blowfish, and Twofish.
CompTIA Security+ SY0-301: 6.2 – Symmetric Encryption Ciphers Read More »
Cryptographic hashes provide us with features such as authentication, integrity, confidentiality, and non-repudiation. In this video, you’ll learn about some of the most popular hashing ciphers.
CompTIA Security+ SY0-301: 6.2 – Cryptographic Hash Functions Read More »
Wireless encryption has changed through the years. In this video, you’ll learn about the early days of 802.11 encryption with WEP and the migration to the current WPA encryption technologies.
Our modern privacy requires new methods of encrypting and protecting our data. In this video, you’ll learn how the emerging technologies of elliptic curve and quantum cryptography are changing the face of encryption.
CompTIA Security+ SY0-301: 6.1 – Elliptic Curve and Quantum Cryptography Read More »
How easy is it to encrypt data and hide it in plain sight? With steganography, there are many ways to sneak your data into other display mechanisms. In this video, you’ll learn about different types of steganography, and you’ll learn the process of hiding your secret messages into a picture.
Certain security environments may require the escrow of cryptographic keys. In this video, you’ll learn about key escrow and how the key escrow process can be implemented.
The cryptographic hash provides some important validation functions. In this video, you’ll learn the basics of cryptographic hashing and how they can be used to provide confidentiality, authentication, non-repudiation, and integrity.
One of the powerful features of modern cryptography is the ability to digitally “sign” your files and documents. In this video, you’ll learn how non-repudiation can be used to ensure the authenticity and integrity of your documents.
CompTIA Security+ SY0-301: 6.1 – Non-repudiation Read More »