Today’s SY0-601 Security+ Pop Quiz: Just called to say hi
Today’s SY0-601 Security+ Pop Quiz: Just called to say hi Read More »
We use hashing and digital signatures extensively to ensure safe and secure data transfers. In this video, you’ll learn about hashing data, salting a hash, and creating a verifying digital signatures. << Previous Video: Symmetric and Asymmetric Cryptography Next: Cryptographic Keys >> A hash is designed to take any type of input, whether that’s
Hashing and Digital Signatures – SY0-601 CompTIA Security+ : 2.8 Read More »
Symmetric and asymmetric cryptography are the fundamentals of our data security. In this video, you’ll learn about symmetric encryption, asymmetric encryption, creating the key pair, and sending data securely using both symmetric and asymmetric cryptography. << Previous Video: Cryptography Concepts Next: Hashing and Digital Signatures >> Let’s begin our conversation of the differences between symmetric
Symmetric and Asymmetric Cryptography – SY0-601 CompTIA Security+ : 2.8 Read More »
The fundamentals of cryptography apply to many aspects of IT security. In this video, you’ll learn about cryptographic concepts such as keys, lightweight cryptography, key stretching, and homomorphic encryption. << Previous Video: Secure Data Destruction Next: Symmetric and Asymmetric Cryptography >> The word cryptography is derived from the Greek word kryptos, which means hidden
Cryptography Concepts – SY0-601 CompTIA Security+ : 2.8 Read More »
There are many ways to permanently remove data from a storage device. In this video, you’ll learn about physical destruction, purging data, and data wiping. << Previous Video: Secure Areas Next: Cryptography Concepts >> As a security professional, you’ll be tasked with knowing what data can be destroyed and what data must not be
Secure Data Destruction – SY0-601 CompTIA Security+ : 2.7 Read More »
The security of a network can sometimes be related to a physical location. In this video, you’ll learn about air gaps, vaults, safe, and hot and cold aisles. << Previous Video: Physical Security Controls Next: Secure Data Destruction >> In the world of IT security, we’re often concerned about making sure that no one
We often focus on digital technologies to protect our networks, but there are many physical devices that can provide additional security. In this video, you’ll learn about access control vestibules, alarms, signs, industrial camouflage, and more. << Previous Video: Embedded Systems Constraints Next: Secure Areas >> If you would like to limit the access
Physical Security Controls – SY0-601 CompTIA Security+ : 2.7 Read More »
There are advantages and disadvantages when using embedded systems. In this video, you’ll learn about the limitations associated with power, networking, upgradability, patching, and more. << Previous Video: Embedded Systems Communication Next: Physical Security Controls >> One of the challenges you have with embedded systems is they’re usually running on a device that is
Embedded Systems Constraints – SY0-601 CompTIA Security+ : 2.6 Read More »
Embedded systems can use many different methods for communication. In this video, you’ll learn how embedded systems use 5G, narrowband, baseband, and Zigbee networks. << Previous Video: Embedded Systems Next: Embedded Systems Constraints >> With the increasing number of embedded systems that are being deployed, it’s important to know how these devices communicate
Embedded Systems Communication – SY0-601 CompTIA Security+ : 2.6 Read More »