CompTIA Security+ (2014 Objectives) prepares networking and IT professionals with the required knowledge and skills to understand the concepts and technologies involved with encryption, cryptography, PKI, and the associated benefits and risks.
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
Using Appropriate Cryptographic Methods Hey, welcome back to Pluralsight, I'm your instructor Christopher Rees and in this module we're going to be covering Using Appropriate Cryptographic Methods. So as we look through this module you'll see there's a ton of information, you're probably saying man that's a lot of stuff to cover in one video. Well, if you look through the list you'll notice that most of this we've already talked about in one form or fashion. Now there are a few things that are new and we'll discuss those in more detail, but what I'd like to do, rather than go through each of these kind of line by line like we've done in previous videos, obviously we've covered them already in other areas, I'd like to kind of just basically recap some of them and then group them together by what they do, whether they're block ciphers, asymmetrical, symmetrical, encryption, or transport mechanisms, just so we kind of see how they all fit together, where one is perhaps more appropriate than the other, or one is deprecated and one is kind of a successor or a new technology, and kind of go through it that way. By grouping them together, hopefully it makes these all kind of fit together and you understand kind of where they're applicable, and then, like I said, there's a few new ones in here like Blowfish, TwoFish, PGP and GPG, and Diffie-Hellman that we'll talk about in a little more detail. So let's go ahead and get started.