Course description
Do you want to know more about protecting your data on your computer? Would you like to see the ins and outs of how that happens? Dive into cryptography and learn about encryption algorithms including 3DES and AES. Understand the difference between symmetric encryption and asymmetric encryption, which is a better solution to use in different circumstances, and why. We’ll explore some of the tools used to secure data both on your hard drive and through emails, as well as focus on the integrity of your data utilizing hashing to authenticate downloads. Finally, we’ll examine public key infrastructure to see how it works under the hood to keep online shopping, banking, and other transactions secure. This course is part of a series covering the CompTIA Advanced Security Practitioner (CASP).
Prerequisites
This course assumes that you have familiarity with information technology, basic networking, and basic security concepts. No scripting or “hacking” experience is required. Having windows command line experience as well as having administrative rights on your machine will be helpful.
Learning Paths
This course will help you prepare for the following certification and exam:
CompTIA Advanced Security
CAS-002: CompTIA Advanced Security Practitioner
Meet the expert
David Bigger is the lead trainer at Bigger IT Solutions. He has been information technology for a little over 20 years and has been training all over the US. He has worked with companies like US Military, Lockheed Martin, General Dynamics, Dominos Pizza, University of Utah and Expedia
Course outline
Introduction to Encryption
Introduction (15:49)
- Introduction (00:20)
- What Is Cryptography? (02:06)
- Caesar Cipher (01:42)
- Scytale (01:40)
- Why Do We Need Cryptography? (02:02)
- Types of Cryptography (00:38)
- Block Ciphers (01:10)
- Transposition Cipher (00:35)
- Substitution Cipher (01:13)
- Diffusion Cipher (00:30)
- Confusion (00:55)
- Stream Ciphers (00:43)
- Attacks on Cryptography (01:49)
- Summary (00:19)
Symmetric and Asymmetric Encryption (28:48)
- Introduction (00:28)
- Symmetric and Asymmetric (01:21)
- Symmetric Algorithms (03:50)
- Symmetric Encryption (00:26)
- Data Encryption Standard (DES) (05:18)
- 3DES (Triple DES) (00:47)
- Advanced Encryption Standard (02:49)
- RC - Rivest Cipher (01:12)
- Skipjack (01:14)
- Asymmetric Encryption (00:17)
- RSA (01:17)
- Diffie-Hellman (02:19)
- Elliptic Curve (01:21)
- El Gamal (01:26)
- Tools for Encryption (00:18)
- PGP - Pretty Good Privacy (02:11)
- GPG - Gnu Privacy Guard (01:41)
- Summary (00:24)
Veracrypt (14:29)
- Introduction (00:27)
- Demo: Veracrypt (03:25)
- Demo: Create Encrypted Volume (04:33)
- Demo: Finishing Up (05:35)
- Summary (00:28)
Hashing (16:13)
- Introduction (00:32)
- Hashing (00:22)
- What Is Hashing? (03:02)
- MD5 Hash (01:29)
- SHA Hashes (00:47)
- MAC (00:45)
- HMAC (00:34)
- RIPEMD (00:50)
- Demo: HashCalc (04:03)
- Demo: Online Hashing Tools (03:24)
- Summary (00:20)
Public Key Infrastructure (17:49)
- Introduction (00:29)
- PKI - Public Key Infrastructure (00:39)
- What Is PKI? (04:35)
- Certificates (01:55)
- Certificate Authority (01:54)
- Registration Authority (01:42)
- CRL (01:12)
- OCSP (01:03)
- Key Escrow (01:39)
- Digital Certificates (02:13)
- Summary (00:24)