CompTIA Security+, Part 8 of 8: Cryptography and Keys
Interactive

CompTIA Security+, Part 8 of 8: Cryptography and Keys

LearnNow Online
Updated Aug 21, 2018

Course description

Here certified technical trainer Ryan Hendricks elucidates the world of cryptography and how IT professionals can use it to support security and confidentiality. Hendricks will explain common encryption algorithms as well as use cases for both symmetric and asymmetric encryption. This course will demonstrate how security certificates work and are validated and also show how hashing algorithms can be used in a production environment.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.


Meet the expert

Ryan Hendricks

Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.

Video Runtime

84 Minutes

Time to complete

104 Minutes

Course Outline

Cryptography & Keys

Cryptology Concepts (28:40)

  • Introduction (00:18)
  • Terminology (02:35)
  • Keyspace (03:11)
  • Symmetric vs. Asymmetric (01:19)
  • Session Keys (01:24)
  • In Band vs. Out of Band (01:51)
  • Block Encryption (01:28)
  • Stream Encryption (01:04)
  • Transport Encryption (02:16)
  • Non-Repudiation (00:44)
  • Hashing (01:01)
  • Key Escrow (01:26)
  • Steganography (01:19)
  • Digital Signatures (02:27)
  • Use of Proven Technologies (01:49)
  • Elliptical Curve & Quantum (01:01)
  • Perfect Forward Secrecy (00:00)
  • Ephemeral Key (02:56)
  • Summary (00:22)

Symmetric Encryption (13:39)

  • Introduction (00:25)
  • Pros (01:08)
  • Cons (01:10)
  • Key Management (02:31)
  • Data Encryption Standard (01:16)
  • 3DES (00:59)
  • Rivest Cipher 4 (01:32)
  • One-Time Pad (01:28)
  • Blowfish/Twofish (01:03)
  • Advanced Encryption Standard (01:33)
  • Summary (00:30)

Asymmetric Encryption (19:46)

  • Introduction (00:22)
  • Pros (01:18)
  • Cons (00:53)
  • Diffie Hellman (00:52)
  • Rivest Shamir Adleman (01:31)
  • Key Pairs (01:34)
  • PGP/GPG (01:08)
  • Public Key Infrastructure (01:00)
  • Digital Certificate (01:17)
  • Certificate Authority (01:26)
  • Trust Models (01:44)
  • Registration Authority (01:00)
  • Certificate Revocation List (01:30)
  • OSCP (01:32)
  • Certificate Signing Request (00:59)
  • Key Escrow (00:55)
  • Summary (00:37)

Hashing (22:19)

  • Introduction (00:25)
  • Hashing Concepts (01:35)
  • Collisions (00:54)
  • Hashing Passwords (02:16)
  • Salting (01:30)
  • MD5 (00:51)
  • NTLM (00:47)
  • Secure Hash Algorithm (01:31)
  • RIPEMD (00:19)
  • Hashing for Authentication (00:53)
  • HMAC (00:38)
  • Demo: Verify Messages (10:02)
  • Summary (00:32)
;