CompTIA Security+ SY0-701

Certificates video title page

Certificates – CompTIA Security+ SY0-701 – 1.4

We use certificates to provide trust when accessing other devices or services. In this video, you’ll learn about digital certificates, certificate signing requests, key revocation, OCSP stapling, and more. << Previous Video: Blockchain Technology Next Video: Threat Actors >> A digital certificate is a file that contains both a public key and a digital signature. […]

Certificates – CompTIA Security+ SY0-701 – 1.4 Read More »

Blockchain Technology video title page

Blockchain Technology – CompTIA Security+ SY0-701 – 1.4

Blockchain technology is the foundation of cryptocurrency, but it can also be used for many other purposes. In this video, you’ll learn how blockchain technology works behind the scenes. << Previous Video: Hashing and Digital Signatures Next Video: Certificates >> Blockchain technology is often described as a distributed ledger. This is a ledger that’s available

Blockchain Technology – CompTIA Security+ SY0-701 – 1.4 Read More »

Hashing and Digital Signatures video title page

Hashing and Digital Signatures – CompTIA Security+ SY0-701 – 1.4

The hashing process can provide integrity, authentication, and non-repudiation. In this video, you’ll learn how hashes are created and how to use digital signatures. << Previous Video: Obfuscation Next Video: Blockchain Technology >> A cryptographic hash is used to represent data as a short string of text. Sometimes you’ll hear this referred to as a

Hashing and Digital Signatures – CompTIA Security+ SY0-701 – 1.4 Read More »

Obfuscation video title page

Obfuscation – CompTIA Security+ SY0-701 – 1.4

Obfuscation can be used in IT security to hide information in unique ways. In this video, you’ll learn about steganography, tokenization, and data masking. << Previous Video: Encryption Technologies Next Video: Hashing and Digital Signatures >> Obfuscation is a process, where you take something that normally would be very easy to understand, and you make

Obfuscation – CompTIA Security+ SY0-701 – 1.4 Read More »

Encryption Technologies video title page

Encryption Technologies – CompTIA Security+ SY0-701 – 1.4

Encryption technologies provide secure key storage, cryptographic functions, and data privacy. In this video, you’ll learn about HSMs, TPMs, secure enclave, and more. << Previous Video: Key Exchange Next Video: Obfuscation >> If you were to look on a modern motherboard, you would find a chip or a subsystem called a Trusted Platform Module, or

Encryption Technologies – CompTIA Security+ SY0-701 – 1.4 Read More »

Public Key Infrastructure video title page

Public Key Infrastructure – CompTIA Security+ SY0-701 – 1.4

Public key infrastructure technologies are the foundation of our modern encryption. In this video, you’ll learn about symmetric encryption, asymmetric encryption, key pair generation, and more. << Previous Video: Technical Change Management Next Video: Encrypting Data >> The term public key infrastructure is a very broad term in cryptography, but it commonly refers to policies

Public Key Infrastructure – CompTIA Security+ SY0-701 – 1.4 Read More »

Technical Change Management video title page

Technical Change Management – CompTIA Security+ SY0-701 – 1.3

A technician is ultimately responsible for putting the change management process into action. In this video, you’ll learn about the technical change management process. << Previous Video: Change Management Next Video: Public Key Infrastructure >> In our previous video, we talked about the change management process. But of course, eventually, the actual change will need

Technical Change Management – CompTIA Security+ SY0-701 – 1.3 Read More »

Change Management video title page

Change Management – CompTIA Security+ SY0-701 – 1.3

As IT professionals, we are constantly updating, modifying, and changing the devices we manage. In this video, you’ll learn how we manage this process with change management. << Previous Video: Deception and Disruption Next Video: Technical Change Management >> When you’re making a change to an application or an operating system that you use at

Change Management – CompTIA Security+ SY0-701 – 1.3 Read More »