Free CompTIA Security+ Training

Hashing and Digital Signatures video title page

Hashing and Digital Signatures – CompTIA Security+ SY0-701 – 1.4

The hashing process can provide integrity, authentication, and non-repudiation. In this video, you’ll learn how hashes are created and how to use digital signatures. << Previous Video: Obfuscation Next Video: Blockchain Technology >> A cryptographic hash is used to represent data as a short string of text. Sometimes you’ll hear this referred to as a […]

Hashing and Digital Signatures – CompTIA Security+ SY0-701 – 1.4 Read More »

Obfuscation video title page

Obfuscation – CompTIA Security+ SY0-701 – 1.4

Obfuscation can be used in IT security to hide information in unique ways. In this video, you’ll learn about steganography, tokenization, and data masking. << Previous Video: Encryption Technologies Next Video: Hashing and Digital Signatures >> Obfuscation is a process, where you take something that normally would be very easy to understand, and you make

Obfuscation – CompTIA Security+ SY0-701 – 1.4 Read More »

Encryption Technologies video title page

Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

Encryption technologies provide secure key storage, cryptographic functions, and data privacy. In this video, you’ll learn about HSMs, TPMs, secure enclave, and more. << Previous Video: Key Exchange Next Video: Obfuscation >> If you were to look on a modern motherboard, you would find a chip or a subsystem called a Trusted Platform Module, or

Encryption Technologies – CompTIA Security+ SY0-701 – 1.4 Read More »

Public Key Infrastructure video title page

Public Key Infrastructure – CompTIA Security+ SY0-701 – 1.4

Public key infrastructure technologies are the foundation of our modern encryption. In this video, you’ll learn about symmetric encryption, asymmetric encryption, key pair generation, and more. << Previous Video: Technical Change Management Next Video: Encrypting Data >> The term public key infrastructure is a very broad term in cryptography, but it commonly refers to policies

Public Key Infrastructure – CompTIA Security+ SY0-701 – 1.4 Read More »

Technical Change Management video title page

Technical Change Management – CompTIA Security+ SY0-701 – 1.3

A technician is ultimately responsible for putting the change management process into action. In this video, you’ll learn about the technical change management process. << Previous Video: Change Management Next Video: Public Key Infrastructure >> In our previous video, we talked about the change management process. But of course, eventually, the actual change will need

Technical Change Management – CompTIA Security+ SY0-701 – 1.3 Read More »

Change Management video title page

Change Management – CompTIA Security+ SY0-701 – 1.3

As IT professionals, we are constantly updating, modifying, and changing the devices we manage. In this video, you’ll learn how we manage this process with change management. << Previous Video: Deception and Disruption Next Video: Technical Change Management >> When you’re making a change to an application or an operating system that you use at

Change Management – CompTIA Security+ SY0-701 – 1.3 Read More »

Deception and Disruption video title page

Deception and Disruption – CompTIA Security+ SY0-701 – 1.2

There are many ways to fool an attacker into disclosing important information about their methods and techniques. In this video, you’ll learn how to use deception and disruption to protect your network. << Previous Video: Physical Security Next Video: Change Management >> As an IT security professional, you’ll spend a lot of time trying to

Deception and Disruption – CompTIA Security+ SY0-701 – 1.2 Read More »