1. Endpoint Protection In this video I’m going to be talking about endpoint protection. So first of all, let’s talk about what are endpoints. Endpoints are basically any computer in your organization. Every single computer in my organization, including my laptop in front of me, including my desktop, including that computer over there. All computers […]
7. SRPT, FTPS, SFTP, SNMP, IMAP In this video, we’re going to be talking about a variety of different secure protocols that you may see appear on your exam. And particularly we’ll talk about SRPC FTPS SFTP SNMP version three. And then we’ll take a look at secure pop and IMAP for emails. So let’s […]
4. Install and setup an FTP Server and Client In this video, we’re going to be installing and configuring an FTP server. Now we’re going to be using a piece of software called FileZilla. FileZilla is a free FTP server that you can download, and it has a free client that you can also download. […]
1. DNSSEC In this video, we’re going to be talking about DNS SEC or SEC or DNS SEC. DNS SEC actually stands for Domain Name System Security Extension. What exactly is this? Well, let’s talk about DNS in general. So remember what DNS does. DNS translates domain names to IP address. Simple enough. Now, during […]
15. Lab: Linear Regression using Estimators When you use an Estimator to perform linear regression, how does the Estimator object know? What is the training data set? What are the while labels and other properties of the regression, such as the batch size or even the number of Eatbox? How does it get this information? […]
15. Ephemeral, PFS, Homomorphic In this video, I’m going to be talking about ephemeral, perfect forward secrecy and homomorphic encryption. Let’s get started. So there’s something called perfect forward secrecy. And here’s what this is. Perfect forward secrecy means that every time you generate a new, for example, SSL session, we’re going to be generating […]
9. Digital signatures In this video, I’m going to be talking about digital signatures and what exactly is it and how do we do it? Okay, so first of all, you got to understand something about a digital signature. A digital signature is something that’s appended to a message that basically does three things. Number […]
12. Key stretching In this video, we’re going to be talking about key stretching. Now, key stretching is something you do when you may be using an algorithm, a cryptographic algorithm, when the key of itself is not long enough. In other words, if you guys remember when I explained to you guys why key […]
6. Asymmetric Ciphers In this video, I’m going to be talking about Asymmetric encryption. Now, asymmetric encryption is where you’re going to use two keys, a public and a private key, in order to do the encryption and decryption process. This is in contrast to symmetric encryption, where you use one key to do both […]
4. Block and stream cipher In this video, we’re going to be talking about cipher suites. Now, the two cipher suites that we’re going to be mentioning here is what’s known as block and stream ciphers. Now what this is, is basically how the encryption is actually getting done. Is it encrypting data block by […]