CompTIA Security+ SY0-301: 6.2 – WEP vs. WPA
Wireless encryption has changed through the years. In this video, you’ll learn about the early days of 802.11 encryption with WEP and the migration to the current WPA encryption technologies.
Wireless encryption has changed through the years. In this video, you’ll learn about the early days of 802.11 encryption with WEP and the migration to the current WPA encryption technologies.
Our modern privacy requires new methods of encrypting and protecting our data. In this video, you’ll learn how the emerging technologies of elliptic curve and quantum cryptography are changing the face of encryption.
CompTIA Security+ SY0-301: 6.1 – Elliptic Curve and Quantum Cryptography Read More »
How easy is it to encrypt data and hide it in plain sight? With steganography, there are many ways to sneak your data into other display mechanisms. In this video, you’ll learn about different types of steganography, and you’ll learn the process of hiding your secret messages into a picture.
Certain security environments may require the escrow of cryptographic keys. In this video, you’ll learn about key escrow and how the key escrow process can be implemented.
The cryptographic hash provides some important validation functions. In this video, you’ll learn the basics of cryptographic hashing and how they can be used to provide confidentiality, authentication, non-repudiation, and integrity.
One of the powerful features of modern cryptography is the ability to digitally “sign” your files and documents. In this video, you’ll learn how non-repudiation can be used to ensure the authenticity and integrity of your documents.
CompTIA Security+ SY0-301: 6.1 – Non-repudiation Read More »
The information traversing our network often contains private or confidential information. In this video, you’ll learn how to use transport encryption methods to protect your sensitive data from prying eyes as it moves across insecure network links.
CompTIA Security+ SY0-301: 6.1 – Transport Encryption Read More »
Symmetric encryption often uses block ciphers or stream ciphers to create ciphertext. In this video, you’ll learn how block and stream ciphers work and what methods these ciphers employ to keep your information private.
CompTIA Security+ SY0-301: 6.1 – Block and Stream Ciphers Read More »
The two most common encryption methods are symmetric and asymmetric encryption. In this video, you’ll learn the differences and when you might to see these two methods employed to protect your data.
CompTIA Security+ SY0-301: 6.1 – Symmetric vs. Asymmetric Encryption Read More »
The topic of cryptography is one of the most comprehensive in network security. In this video, you’ll learn about the history of cryptography and some of the early methods of encrypting and decrypting messages.
CompTIA Security+ SY0-301: 6.1 – Cryptography Overview Read More »