Learn your way! Get started

CompTIA Security+, Part 8: Cryptography and Keys

with expert Ryan Hendricks


Watch trailer

CompTIA Security+, Part 8: Cryptography and Keys Trailer

Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 4/15/2016
Level Level Intermediate
Runtime Runtime 1h 24m
Closed captioning Closed captioning Included
Transcript Transcript Included
eBooks / courseware eBooks / courseware N/A
Hands-on labs Hands-on labs N/A
Sample code Sample code N/A
Exams Exams Included


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Here certified technical trainer Ryan Hendricks elucidates the world of cryptography and how IT professionals can use it to support security and confidentiality. Hendricks will explain common encryption algorithms as well as use cases for both symmetric and asymmetric encryption. This course will demonstrate how security certificates work and are validated and also show how hashing algorithms can be used in a production environment.

Prerequisites

This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Security+ Certification

Meet the expert

Ryan Hendricks Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.


Course outline



Cryptography & Keys

Cryptology Concepts (28:40)
  • Introduction (00:18)
  • Terminology (02:35)
  • Keyspace (03:11)
  • Symmetric vs. Asymmetric (01:19)
  • Session Keys (01:24)
  • In Band vs. Out of Band (01:51)
  • Block Encryption (01:28)
  • Stream Encryption (01:04)
  • Transport Encryption (02:16)
  • Non-Repudiation (00:44)
  • Hashing (01:01)
  • Key Escrow (01:26)
  • Steganography (01:19)
  • Digital Signatures (02:27)
  • Use of Proven Technologies (01:49)
  • Elliptical Curve & Quantum (01:01)
  • Perfect Forward Secrecy (00:00)
  • Ephemeral Key (02:56)
  • Summary (00:22)
Symmetric Encryption (13:39)
  • Introduction (00:25)
  • Pros (01:08)
  • Cons (01:10)
  • Key Management (02:31)
  • Data Encryption Standard (01:16)
  • 3DES (00:59)
  • Rivest Cipher 4 (01:32)
  • One-Time Pad (01:28)
  • Blowfish/Twofish (01:03)
  • Advanced Encryption Standard (01:33)
  • Summary (00:30)
Asymmetric Encryption (19:46)
  • Introduction (00:22)
  • Pros (01:18)
  • Cons (00:53)
  • Diffie Hellman (00:52)
  • Rivest Shamir Adleman (01:31)
  • Key Pairs (01:34)
  • PGP/GPG (01:08)
  • Public Key Infrastructure (01:00)
  • Digital Certificate (01:17)
  • Certificate Authority (01:26)
  • Trust Models (01:44)
  • Registration Authority (01:00)
  • Certificate Revocation List (01:30)
  • OSCP (01:32)
  • Certificate Signing Request (00:59)
  • Key Escrow (00:55)
  • Summary (00:37)
Hashing (22:19)
  • Introduction (00:25)
  • Hashing Concepts (01:35)
  • Collisions (00:54)
  • Hashing Passwords (02:16)
  • Salting (01:30)
  • MD5 (00:51)
  • NTLM (00:47)
  • Secure Hash Algorithm (01:31)
  • RIPEMD (00:19)
  • Hashing for Authentication (00:53)
  • HMAC (00:38)
  • Demo: Verify Messages (10:02)
  • Summary (00:32)