CompTIA Security+ Full Course: Cryptography Use Cases

Cryptography Use Cases
Exam blueprint objectives covered in this video:
✅1.2 Given a scenario, analyze potential indicators to determine the type of attack
✅2.8 Summarize the basics of cryptographic concepts
My name is Andrei Ciorba and I'm on a mission: to give you access to FREE IT certification training on this channel!
I'm a CCIE (36818), CEH, CCNP, CCDP, CCNA (3 tracks), CompTIA Network+, Security+ and CySA+ certified, along with many other Cisco, Fortinet, VMware, Hashicorp, Microsoft and Docker certifications. So I hope I know enough to teach you something! 😊
________________________________________________________
Ready to pass your CompTIA Security+ exam?
👍 If YES, go and take the exam, what are you waiting for?
☕️ If NOT, then you're in the right place!
This series of FREE trainings for CompTIA Security+ will prepare you for the SY0-601 exam so let's get started!
________________________________________________________
📨 Reach out to me on andrei27@gmail.com
📱 Add&stalk me on Facebook: / andrei.ciorba
📃 Check out my certifications on LinkedIn: / andreiciorba
💸 If you like what I do and you wish to contribute at least with one coffee, please do! 😃 💸
☕️ Downloadable all-in-one bundle: STUDY GUIDE (260 pages!), cheat sheet and PDF slides: www.buymeacoffee.com/andreic2...
☕️ Downloadable PDF slides: www.buymeacoffee.com/andreic2...
☕️ Downloadable PPTX slides: www.buymeacoffee.com/andreic2...
☕️ Buy me a coffee - www.buymeacoffee.com/andreic27
💵 Support me on Patreon - / andrewcertified
💶 Or contribute on Revolut - revolut.me/andrei27rev
My deepest thanks, whichever way you choose to contribute!
#comptia #freecomptia #comptiaexam #certification #security #cybersecurity #securityplus

Пікірлер: 15

  • @alynch1245
    @alynch1245 Жыл бұрын

    Within the first 20 minutes, you completely de-mystified cryptography. Thank you

  • @joesauceda69
    @joesauceda695 ай бұрын

    I just wanted to say THANK YOUUUUU sooooo much for taking sooo much of your time to put these videos together for us to learn from. I know you don’t have much to gain from doing all of this for us but super sincerely thank you so so so much!!!

  • @iSgapetti
    @iSgapetti11 ай бұрын

    You are easily one of the best at explaining these really complex concepts. Kudos to you man :)

  • @CyberRoundUp
    @CyberRoundUp11 ай бұрын

    8:59 I would also add non-repudiation as well because it ensures that the originator of a message (Alice) or transaction cannot deny their involvement or the authenticity of the communication.

  • @jamespridmore
    @jamespridmore Жыл бұрын

    This is great content. Thank you for your time.

  • @gaeldilamh2572
    @gaeldilamh2572 Жыл бұрын

    First of all . Thank you so much for what you are doing. I must say that I always thought professor Messer’s was the one and the best. But you sir are kind of in a league by yourself. You really up there. Honestly in term of explaining concepts for the random guy to understand, you are definitely the best by far. So thank you. I’m studying to right the exam next Thursday. I bought a book on Amazon and I’m watching you mostly and professor Messer’s also . I’m an auto mechanic, and want to transition to cybersecurity for all the benefits we all know:) I’have started the study 2 weeks ago and taking 2 hours a day to study the material.. Ok enough say,now I have a concern about DIGITAL SIGNATURE : I thought that you when it comes to ENCRYPTION and DECRYPTION, it is either a relationship between TWO PUBLIC KEYS pré shared Or ONE PUBLIC AND ONE PRIVATE KEY ,and the PRIVATE ONE being the one used to decrypt. Now in this video you saying (talking about Digital Signature) that the receiver will take the Encrypted Hash to decrypt it using his public key… I don’t know if I missed something but I’m watching the whole video if it helps me to understand I will delete this message.. Thank u again

  • @iSgapetti

    @iSgapetti

    11 ай бұрын

    I don't know where you got the concept of asymmetric algorithms having two PUBLIC keys pre-shared. Also, kindly read up on the term "vice-versa". He literally stated in the previous video that you can encrypt with private key, decrypt with public key and VICE-VERSA (this means the other way around - you can encrypt with public key, decrypt with private key). The PRIVATE KEY is NOT ONLY used to decrypt (it can encrypt as well) and the PUBLIC KEY is NOT ONLY used to encrypt (it can decrypt as well). Now to answer your question: "Now in this video you saying (talking about Digital Signature) that the receiver will take the Encrypted Hash to decrypt it using his public key…" - The receiver will decrypt the encrypted hash using the SENDER's public key.

  • @JustSoBoss
    @JustSoBoss Жыл бұрын

    Thanks

  • @yongkahneville1164
    @yongkahneville1164 Жыл бұрын

    So I’m confused. How will bob decrypt Alice’s digital signature with a public key . You explained in the last video that the public key encrypts messages that can only be decrypted by the private key .

  • @iSgapetti

    @iSgapetti

    11 ай бұрын

    Try to rewatch the previous video (Cryptography Explained). Bob should know Alice's public key since it is, obviously, public. "Encrypt with private key, decrypt with public key Or vice-versa (encrypt with public key, decrypt with private key)"

  • @MelbourneShorts11
    @MelbourneShorts11 Жыл бұрын

    thanks tobey

  • @hrushikway
    @hrushikway8 ай бұрын

    13/41

  • @cyberghost_01
    @cyberghost_01 Жыл бұрын

    How can be used public Key to decrypt Digital signature if public Key Is used only ti encrypt?

  • @iSgapetti

    @iSgapetti

    11 ай бұрын

    Bruh, he literally said in the last video that the public key can also be used to decrypt data. "Encrypt with private key, decrypt with public key Or vice-versa (encrypt with public key, decrypt with private key)"

  • @kyleharry6758

    @kyleharry6758

    5 ай бұрын

    is it still a digital envelope if you use a private key while sending the plaintext and the recipient uses a public key?@@iSgapetti