Learn your way! Get started

CASP, Part 1 of 9: Cryptography

with expert David Bigger


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 10/4/2016
Level Beginner
Runtime 1h 33m
Closed captioning Included
Transcript Included
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Do you want to know more about protecting your data on your computer? Would you like to see the ins and outs of how that happens? Dive into cryptography and learn about encryption algorithms including 3DES and AES. Understand the difference between symmetric encryption and asymmetric encryption, which is a better solution to use in different circumstances, and why. We’ll explore some of the tools used to secure data both on your hard drive and through emails, as well as focus on the integrity of your data utilizing hashing to authenticate downloads. Finally, we’ll examine public key infrastructure to see how it works under the hood to keep online shopping, banking, and other transactions secure. This course is part of a series covering the CompTIA Advanced Security Practitioner (CASP).

Prerequisites

This course assumes that you have familiarity with information technology, basic networking, and basic security concepts. No scripting or “hacking” experience is required. Having windows command line experience as well as having administrative rights on your machine will be helpful.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Advanced Security
CAS-002: CompTIA Advanced Security Practitioner

Meet the expert

David Bigger is the lead trainer at Bigger IT Solutions. He has been information technology for a little over 20 years and has been training all over the US. He has worked with companies like US Military, Lockheed Martin, General Dynamics, Dominos Pizza, University of Utah and Expedia

Course outline



Introduction to Encryption

Introduction (15:49)
  • Introduction (00:20)
  • What Is Cryptography? (02:06)
  • Caesar Cipher (01:42)
  • Scytale (01:40)
  • Why Do We Need Cryptography? (02:02)
  • Types of Cryptography (00:38)
  • Block Ciphers (01:10)
  • Transposition Cipher (00:35)
  • Substitution Cipher (01:13)
  • Diffusion Cipher (00:30)
  • Confusion (00:55)
  • Stream Ciphers (00:43)
  • Attacks on Cryptography (01:49)
  • Summary (00:19)
Symmetric and Asymmetric Encryption (28:48)
  • Introduction (00:28)
  • Symmetric and Asymmetric (01:21)
  • Symmetric Algorithms (03:50)
  • Symmetric Encryption (00:26)
  • Data Encryption Standard (DES) (05:18)
  • 3DES (Triple DES) (00:47)
  • Advanced Encryption Standard (02:49)
  • RC - Rivest Cipher (01:12)
  • Skipjack (01:14)
  • Asymmetric Encryption (00:17)
  • RSA (01:17)
  • Diffie-Hellman (02:19)
  • Elliptic Curve (01:21)
  • El Gamal (01:26)
  • Tools for Encryption (00:18)
  • PGP - Pretty Good Privacy (02:11)
  • GPG - Gnu Privacy Guard (01:41)
  • Summary (00:24)
Veracrypt (14:29)
  • Introduction (00:27)
  • Demo: Veracrypt (03:25)
  • Demo: Create Encrypted Volume (04:33)
  • Demo: Finishing Up (05:35)
  • Summary (00:28)
Hashing (16:13)
  • Introduction (00:32)
  • Hashing (00:22)
  • What Is Hashing? (03:02)
  • MD5 Hash (01:29)
  • SHA Hashes (00:47)
  • MAC (00:45)
  • HMAC (00:34)
  • RIPEMD (00:50)
  • Demo: HashCalc (04:03)
  • Demo: Online Hashing Tools (03:24)
  • Summary (00:20)
Public Key Infrastructure (17:49)
  • Introduction (00:29)
  • PKI - Public Key Infrastructure (00:39)
  • What Is PKI? (04:35)
  • Certificates (01:55)
  • Certificate Authority (01:54)
  • Registration Authority (01:42)
  • CRL (01:12)
  • OCSP (01:03)
  • Key Escrow (01:39)
  • Digital Certificates (02:13)
  • Summary (00:24)