CompTIA Security+ SY0-501

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1

The keys used in cryptography may consist of many different characteristics. In this video, you’ll learn about key strength, the key exchange process, and real-time encryption and decryption. << Previous Video: Weak Encryption Next: Steganography >> Cryptography doesn’t rely on security through obscurity. With cryptography, you know practically everything about the cryptographic process. The entire

Cryptographic Keys – CompTIA Security+ SY0-501 – 6.1 Read More »

Weak Encryption – CompTIA Security+ SY0-501 – 6.1

Not all encryption is equally secure. In this video, you’ll learn what makes an encryption method strong or weak. << Previous Video: Randomizing Cryptography Next: Cryptographic Keys >> When you start comparing different kinds of cryptography, you’ll find that some we refer to as strong cryptography, and others might be considered weak cryptography. We make

Weak Encryption – CompTIA Security+ SY0-501 – 6.1 Read More »

Randomizing Cryptography – CompTIA Security+ SY0-501 – 6.1

We rely heavily on randomization when using cryptography. In this video, you’ll learn about the importance of randomization and how random information is used to provide data security. << Previous Video: Hashing and Digital Signatures Next: Weak Encryption >> In an earlier video, I talked about encryption relying on randomisation. And here’s a good example.

Randomizing Cryptography – CompTIA Security+ SY0-501 – 6.1 Read More »

Hashing and Digital Signatures – CompTIA Security+ SY0-501 – 6.1

A cryptographic hash can be used for many different tasks. In this video, you’ll learn about hashing, collisions, digital signatures, and more. << Previous Video: Symmetric and Asymmetric Encryption Next: Randomizing Cryptography >> A cryptographic hash allows you to take any amount of data– it can be a small bit of text, or it can

Hashing and Digital Signatures – CompTIA Security+ SY0-501 – 6.1 Read More »

Symmetric and Asymmetric Encryption – CompTIA Security+ SY0-501 – 6.1

If you’re planning to implement cryptography, then you’ll probably be using either symmetric encryption or asymmetric encryption. In this video, you’ll learn about both of these valuable encryption mechanisms. << Previous Video: Cryptography Concepts Next: Hashing and Digital Signatures >> If you’ve implemented symmetric encryption using a single shared key for both the encryption process

Symmetric and Asymmetric Encryption – CompTIA Security+ SY0-501 – 6.1 Read More »

Cryptography Concepts – CompTIA Security+ SY0-501 – 6.1

The basics of cryptography are valuable fundamentals for building a secure network. In this video, you’ll learn about cryptographic terms, the value of the key, the concepts of confusion and diffusion, and more. << Previous Video: Data Roles and Retention Next: Symmetric and Asymmetric Encryption >> Cryptography is derived from the Greek word “kryptos,” which

Cryptography Concepts – CompTIA Security+ SY0-501 – 6.1 Read More »

Data Roles and Retention – CompTIA Security+ SY0-501 – 5.8

Who owns your data, and how long do you keep copies of your data? In this video, you’ll learn about specific data roles and options for data retention. << Previous Video: Handling Sensitive Data Next: Cryptography Concepts >> In most organizations, data doesn’t exist on its own. There is a relationship between the data and

Data Roles and Retention – CompTIA Security+ SY0-501 – 5.8 Read More »

Handling Sensitive Data – CompTIA Security+ SY0-501 – 5.8

Different types of data need to be uniquely managed. In this video, you’ll learn about labeling sensitive data and some common sensitive data types. << Previous Video: Data Destruction Next: Data Roles and Retention >> In your organization, you’re going to be working with lots of different kinds of data. But not all of the

Handling Sensitive Data – CompTIA Security+ SY0-501 – 5.8 Read More »