Free CompTIA Security+ Training

Hashing Algorithms – CompTIA Security+ SY0-501 – 6.2

There are many methods and implementations of cryptographic hashing. In this video, you’ll learn about some of the most popular hashing algorithms. << Previous Video: Asymmetric Algorithms Next: Key Stretching Algorithms >> One type of hash that’s been around for a while but you’ll still see it in use today is MD5, or the MD5 […]

Hashing Algorithms – CompTIA Security+ SY0-501 – 6.2 Read More »

Asymmetric Algorithms – CompTIA Security+ SY0-501 – 6.2

Asymmetric encryption has enabled the exchange of symmetric keys, encryption of data, digital signatures, and other significant security features. In this video, you’ll learn about these asymmetric algorithms and their use. << Previous Video: Block Cipher Modes Next: Hashing Algorithms >> One popular form of asymmetric cryptography is the Diffie-Hellman key exchange. This key exchange

Asymmetric Algorithms – CompTIA Security+ SY0-501 – 6.2 Read More »

Symmetric Algorithms – CompTIA Security+ SY0-501 – 6.2

Symmetric ciphers are some of the most commonly used encryption methods on the Internet. In this video, you’ll learn about DES, 3DES, RC4, AES, Blowfish, and Twofish. << Previous Video: Common Cryptography Use Cases Next: Block Cipher Modes >> DES, or the Data Encryption Standard, was one of the most popular symmetric encryption algorithms in

Symmetric Algorithms – CompTIA Security+ SY0-501 – 6.2 Read More »

Cryptography Use Cases – CompTIA Security+ SY0-501 – 6.1

We use cryptography for many different purposes. In this video, you’ll learn about some of the most common cryptography use cases. << Previous Video: Perfect Forward Secrecy Next: Symmetric Algorithms >> One of the challenges we have with today’s mobile devices is we’re limited by the amount of battery that we currently have available. There

Cryptography Use Cases – CompTIA Security+ SY0-501 – 6.1 Read More »

Perfect Forward Secrecy – CompTIA Security+ SY0-501 – 6.1

Traditional web server encryption has relied on a single private key to provide confidentiality. In this video, you’ll learn about the alternative of perfect forward secrecy. << Previous Video: States of Data Next: Common Cryptography Use Cases >> When our browser is communicating to a web server over an encrypted channel it’s using SSL, or

Perfect Forward Secrecy – CompTIA Security+ SY0-501 – 6.1 Read More »

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1

It’s common to use encryption methods that best suit the task at hand. In this video, you’ll learn about the differences between stream ciphers and block ciphers. << Previous Video: Steganography Next: States of Data >> We communicate across the network in different ways. And because of this, we use different types of encryption, depending

Stream and Block Ciphers – CompTIA Security+ SY0-501 – 6.1 Read More »

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

The keys used in cryptography may consist of many different characteristics. In this video, you’ll learn about key strength, the key exchange process, and real-time encryption and decryption. << Previous Video: Weak Encryption Next: Steganography >> Cryptography doesn’t rely on security through obscurity. With cryptography, you know practically everything about the cryptographic process. The entire

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1 Read More »