O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Security+ SY0-201 Video Course Domain 5 - Cryptography

Video Description

Cryptography

Shon Harris

The fast, powerful way to prepare for your CompTIA Security+ exam!

Get all the hands-on training you need to pass (ISC)²’s tough SSCP exam, get certified, and move forward in your IT security career! In this online video, the world’s #1 information security trainer walks you through every skill and concept you’ll need to master. This online video contains over five hours of training adapted from Shon Harris’s legendary five-day SSCP boot camps–including realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-world settings!

Comprehensive coverage of CompTIA Security+ domains of knowledge:

     .    Cryptographic Definitions

     .    Key Space

     .    Symmetric Characteristics

     .    Key Agreement Schemes

     .    Key Usage

     .    Full Disk Encryption

About the Shon Harris Security Series

This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. Every product in this series reflects Shon Harris’s unsurpassed experience in teaching IT security professionals.

Category: Security

System Requirements

OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later
MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers
COMPUTER: 500MHz or higher CPU; 128MB RAM or more

Table of Contents

  1. Course Introduction 00:06:59
  2. Domain 5 - Cryptography 00:00:43
  3. Services Provided by Cryptography 00:01:13
  4. Cryptographic Definitions 00:01:15
  5. Cipher 00:01:36
  6. A Few More Definitions 00:01:09
  7. Need Some More Definitions? 00:01:24
  8. Symmetric Cryptography - Use of Secret Keys 00:01:23
  9. Scytale Cipher 00:01:03
  10. Substitution Ciphers 00:01:55
  11. Simple Substitution Cipher Atbash 00:01:19
  12. Simple Substitution Cipher Caesar Cipher 00:01:59
  13. Simple Substitution Cipher ROT13 00:01:33
  14. Historical Uses 00:01:14
  15. Polyalphabetic Cipher - Vigenere Cipher 00:02:50
  16. Enigma Machine 00:02:33
  17. U-Boats had Enigma Machines 00:03:11
  18. Historical Uses of Symmetric Cryptography - Running Key and Concealment 00:03:01
  19. Agenda 1 00:01:30
  20. Key and Algorithm Relationship 00:02:27
  21. Does Size Really Matter? 00:00:35
  22. Key Space 00:01:20
  23. Ways of Breaking Cryptosystems - Brute Force 00:01:53
  24. Brute Force Components 00:00:44
  25. Ways of Breaking Cryptosystems - Frequency Analysis 00:01:40
  26. Strength of a Cryptosystem 00:01:40
  27. Do You Know What You are Doing? 00:00:37
  28. Developing Cryptographic Solutions In-House 00:01:15
  29. Characteristics of Strong Algorithms 00:02:48
  30. Open or Closed More Secure? 00:01:23
  31. Agenda 2 00:00:39
  32. Type of Symmetric Cipher - Block Cipher 00:01:09
  33. S-Boxes Used in Block Ciphers 00:01:33
  34. Binary Mathematical Function 1 00:01:25
  35. Type of Symmetric Cipher - Stream Cipher 00:01:43
  36. Symmetric Characteristics 00:00:47
  37. Initialization Vectors 00:01:42
  38. Security Holes 00:05:07
  39. Strength of a Stream Cipher 00:00:42
  40. Let's Dive in Deeper 00:01:50
  41. Out-of-Band Transmission 00:01:57
  42. Symmetric Key Management Issue 00:02:51
  43. Why? 00:00:35
  44. Asymmetric Cryptography 00:00:57
  45. Key Functions 00:00:55
  46. Public Key Cryptography Advantages 00:02:53
  47. Asymmetric Algorithm Disadvantages 00:01:14
  48. Confusing Names 00:01:39
  49. Symmetric versus Asymmetric 00:00:59
  50. Questions 1 00:04:29
  51. When to Use Which Key 00:01:44
  52. Using the Algorithm Types Together 00:00:39
  53. Encryption Steps 00:02:28
  54. Receiver's Public Key Is Used to Encrypt the Symmetric Key 00:00:42
  55. Receiver's Private Key Is Used to Decrypt the Symmetric Key 00:01:16
  56. Digital Envelope 00:01:07
  57. Secret versus Session Keys 00:01:01
  58. Asymmetric Algorithm - Diffie-Hellman 00:06:35
  59. Key Agreement Schemes 00:00:49
  60. Asymmetric Algorithm - RSA 00:01:35
  61. Factoring Large Numbers 00:01:57
  62. RSA Operations 00:01:08
  63. RSA Key Size 00:01:01
  64. El Gamal 00:00:41
  65. ECC 00:01:11
  66. ECC Benefits 00:00:50
  67. Asymmetric Mathematics 00:03:34
  68. Asymmetric Security 00:00:46
  69. Mathematics 00:00:43
  70. Symmetric Algorithms - DES 00:06:12
  71. Block Cipher 00:01:07
  72. Double DES 00:01:36
  73. Evolution of DES 00:00:59
  74. Modes of 3DES 00:01:14
  75. Encryption Modes 00:01:42
  76. Block Cipher Modes - CBC 00:02:29
  77. Different Modes of Block Ciphers - ECB 00:02:00
  78. Block Cipher Modes - CFB and OFB 00:04:06
  79. CFB and OFB Modes 00:01:42
  80. Counter Mode 00:02:47
  81. Modes Summary 00:01:46
  82. Symmetric Cipher - AES 00:01:53
  83. IDEA 00:00:41
  84. RC4 00:00:39
  85. RC5 00:00:31
  86. Agenda 3 00:00:52
  87. Hashing Steps 00:01:06
  88. Protecting the Integrity of Data 00:01:01
  89. Hashing Algorithms 00:02:22
  90. Data Integrity Mechanisms 00:01:23
  91. Hashing Strength 00:00:35
  92. Question 1 00:01:06
  93. More Protection in Data Integrity 00:00:40
  94. MAC 00:01:12
  95. HMAC - Sender 00:00:35
  96. HMAC - Receiver 00:01:16
  97. Another Look 00:01:03
  98. What Services 00:00:38
  99. Authentication Types 00:02:07
  100. MAC Using Block Ciphers 00:00:59
  101. Integrity? 00:01:00
  102. What Services? 00:01:30
  103. Question 2 00:01:26
  104. Digital Signatures 00:02:07
  105. One More Look 1 00:00:36
  106. U.S. Government Standard 00:01:04
  107. What Is... 00:01:12
  108. Zero Knowledge Proof 00:01:07
  109. Message Integrity Controls 00:01:01
  110. Security Issues in Hashing 00:01:22
  111. Example of a Birthday Attack 00:03:00
  112. Birthday Attack Issues 00:00:52
  113. Key Management 00:02:50
  114. Key Usage 00:01:34
  115. Cryptoperiod 00:00:39
  116. M-of-N 00:01:47
  117. Key Types 00:01:22
  118. Agenda 4 00:01:17
  119. PKI and Its Components 00:00:57
  120. PKI 00:00:47
  121. PKI Steps 00:01:07
  122. RA Roles 00:02:29
  123. CA 00:00:34
  124. Let's Walk Through an Example 00:01:36
  125. Digital Certificates 00:02:25
  126. Certificate 00:00:45
  127. Signing the Certificate 00:00:52
  128. Verifying the Certificate 00:03:34
  129. Trusted CA's 00:01:30
  130. Non-Trusted CA 00:02:49
  131. One More Look 2 00:00:40
  132. What Do You Do with a Certificate? 00:05:01
  133. Components of PKI, Repository, and CRLs 00:02:21
  134. Revoked? 00:01:50
  135. CRL Process 00:02:45
  136. Different Uses for Certificates 00:00:27
  137. Lifecycle of a Certificate 00:01:45
  138. Cross Certification 00:02:58
  139. PKI and Trust 00:01:41
  140. Agenda 5 00:00:38
  141. Historical Uses of Symmetric Cryptography - Vernam Cipher 00:00:54
  142. Binary Mathematical Function 2 00:02:19
  143. One-Time Pad in Action 00:00:45
  144. One-Time Pad Characteristics 00:03:32
  145. Steganography 00:01:57
  146. Digital Watermarking 00:01:11
  147. Link versus End-to-End Encryption 00:03:02
  148. End-to-End Encryption 00:01:28
  149. Encryption Location 00:01:15
  150. Email Standards 00:02:16
  151. You Decide 00:02:40
  152. Non-Hierarchical 00:01:48
  153. Secure Protocols 00:02:18
  154. SSL Connection Setup 00:04:13
  155. Example - SSL 00:01:09
  156. Validating Certificate 00:00:58
  157. Secure Protocols (Cont.) 00:02:16
  158. SSL and the OSI Model 00:01:57
  159. E-Commerce 00:04:15
  160. How Are You Doing? 00:00:46
  161. Hard the First Times Through 00:00:42
  162. Secure Email Standard 00:02:05
  163. Agenda 6 00:02:58
  164. IPSec Key Management 00:01:48
  165. IPSec Handshaking Process 00:01:00
  166. VPN Establishment 00:01:55
  167. SAs in Use 00:03:04
  168. Key Issues Within IPSec 00:02:24
  169. IPSec Configuration Options 00:00:45
  170. IPSec Is a Suite of Protocols 00:03:17
  171. AH and ESP Modes 00:02:13
  172. IPSec Modes of Operation 00:01:14
  173. VPN Establishment (Cont.) 00:02:04
  174. Review 00:02:08
  175. Questions 2 00:02:20
  176. Attack Types 00:00:43
  177. Attacks on Cryptosystems 00:01:23
  178. Known-Plaintext Attack 00:01:53
  179. Chosen-Plaintext Attack 00:01:11
  180. Chosen-Ciphertext Attack 00:02:01
  181. Adaptive Attacks 00:01:00
  182. Side Channel Attacks 00:01:17
  183. Trusted Platform Module (TPM) 00:01:21
  184. TPM 00:00:47
  185. Full Disk Encryption 00:07:03
  186. Putting It All Together 00:03:16
  187. SSH 00:02:07
  188. Authentication Methods Supported 00:00:52
  189. Network Protection 00:00:42
  190. Ciphers Provided 00:02:07
  191. Domain 5 Review 00:00:36