CASP, Part 1 of 9: Cryptography
Interactive

CASP, Part 1 of 9: Cryptography

LearnNow Online
Updated Aug 21, 2018

Course description

Do you want to know more about protecting your data on your computer? Would you like to see the ins and outs of how that happens? Dive into cryptography and learn about encryption algorithms including 3DES and AES. Understand the difference between symmetric encryption and asymmetric encryption, which is a better solution to use in different circumstances, and why. We’ll explore some of the tools used to secure data both on your hard drive and through emails, as well as focus on the integrity of your data utilizing hashing to authenticate downloads. Finally, we’ll examine public key infrastructure to see how it works under the hood to keep online shopping, banking, and other transactions secure. This course is part of a series covering the CompTIA Advanced Security Practitioner (CASP).

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

This course assumes that you have familiarity with information technology, basic networking, and basic security concepts. No scripting or “hacking” experience is required. Having windows command line experience as well as having administrative rights on your machine will be helpful.


Meet the expert

David Bigger

David Bigger is the lead trainer at Bigger IT Solutions. He has been information technology for a little over 20 years and has been training all over the US. He has worked with companies like US Military, Lockheed Martin, General Dynamics, Dominos Pizza, University of Utah and Expedia

Video Runtime

93 Minutes

Time to complete

113 Minutes

Course Outline

Introduction to Encryption

Introduction (15:49)

  • Introduction (00:20)
  • What Is Cryptography? (02:06)
  • Caesar Cipher (01:42)
  • Scytale (01:40)
  • Why Do We Need Cryptography? (02:02)
  • Types of Cryptography (00:38)
  • Block Ciphers (01:10)
  • Transposition Cipher (00:35)
  • Substitution Cipher (01:13)
  • Diffusion Cipher (00:30)
  • Confusion (00:55)
  • Stream Ciphers (00:43)
  • Attacks on Cryptography (01:49)
  • Summary (00:19)

Symmetric and Asymmetric Encryption (28:48)

  • Introduction (00:28)
  • Symmetric and Asymmetric (01:21)
  • Symmetric Algorithms (03:50)
  • Symmetric Encryption (00:26)
  • Data Encryption Standard (DES) (05:18)
  • 3DES (Triple DES) (00:47)
  • Advanced Encryption Standard (02:49)
  • RC - Rivest Cipher (01:12)
  • Skipjack (01:14)
  • Asymmetric Encryption (00:17)
  • RSA (01:17)
  • Diffie-Hellman (02:19)
  • Elliptic Curve (01:21)
  • El Gamal (01:26)
  • Tools for Encryption (00:18)
  • PGP - Pretty Good Privacy (02:11)
  • GPG - Gnu Privacy Guard (01:41)
  • Summary (00:24)

Veracrypt (14:29)

  • Introduction (00:27)
  • Demo: Veracrypt (03:25)
  • Demo: Create Encrypted Volume (04:33)
  • Demo: Finishing Up (05:35)
  • Summary (00:28)

Hashing (16:13)

  • Introduction (00:32)
  • Hashing (00:22)
  • What Is Hashing? (03:02)
  • MD5 Hash (01:29)
  • SHA Hashes (00:47)
  • MAC (00:45)
  • HMAC (00:34)
  • RIPEMD (00:50)
  • Demo: HashCalc (04:03)
  • Demo: Online Hashing Tools (03:24)
  • Summary (00:20)

Public Key Infrastructure (17:49)

  • Introduction (00:29)
  • PKI - Public Key Infrastructure (00:39)
  • What Is PKI? (04:35)
  • Certificates (01:55)
  • Certificate Authority (01:54)
  • Registration Authority (01:42)
  • CRL (01:12)
  • OCSP (01:03)
  • Key Escrow (01:39)
  • Digital Certificates (02:13)
  • Summary (00:24)
;