Category Archives: Uncategorized
15. Ephemeral, PFS, Homomorphic In this video, I’m going to be talking about ephemeral, perfect forward secrecy and homomorphic encryption. Let’s get started. So there’s something called perfect forward secrecy. And here’s what this is. Perfect forward secrecy means that every time you generate a new, for example, SSL session, we’re going to be generating […]
9. Digital signatures In this video, I’m going to be talking about digital signatures and what exactly is it and how do we do it? Okay, so first of all, you got to understand something about a digital signature. A digital signature is something that’s appended to a message that basically does three things. Number […]
12. Key stretching In this video, we’re going to be talking about key stretching. Now, key stretching is something you do when you may be using an algorithm, a cryptographic algorithm, when the key of itself is not long enough. In other words, if you guys remember when I explained to you guys why key […]
6. Asymmetric Ciphers In this video, I’m going to be talking about Asymmetric encryption. Now, asymmetric encryption is where you’re going to use two keys, a public and a private key, in order to do the encryption and decryption process. This is in contrast to symmetric encryption, where you use one key to do both […]
4. Block and stream cipher In this video, we’re going to be talking about cipher suites. Now, the two cipher suites that we’re going to be mentioning here is what’s known as block and stream ciphers. Now what this is, is basically how the encryption is actually getting done. Is it encrypting data block by […]
1. Introduction to cryptography In this video, we’re going to be talking about cryptography. So cryptography affects all aspects of your life in the digital world. There is no way the digital world that we live in today would have been what it is today without cryptography. Imagine a world where no data is encrypted. […]
1. Physical Security Controls In this video, we’re going to be talking about physical security and a whole variety of different physical security controls that we can apply with securing our systems, networks and people. Now, let’s I always start out physical security. Whether I’m teaching a Security Plus, I’m teaching a CISSP or even […]
1. Embedded Systems In this video we’re going to be talking about embedded systems. So first of all, what are embedded systems? Embedded systems are basically systems or computers that are generally there to serve a single purpose. It’s basically a system that contains its own memory, its own processor, its own memory management and […]
240. Conclusion Congratulations, you’ve made it to the end of this course. Now, we’ve covered a lot of material throughout this course and our time together. During our time, we’ve covered everything you need to know to understand all five of the domains covered by the CompTIA PenTest+ certification exam. Let’s review those five domains […]
237. Steganography Tools (OBJ 5.3) In this lesson, we’re going to talk about steganography tools. Now, steganography tools are going to be used to hide and conceal information, communication and activity in plain sight. Now remember, steganography is not a form of encryption, but it is a way of hiding data inside of plain sight, […]