Today, encryption is the most effective way to secure digital data. Lisa Bock provides an overview of various cryptographic techniques to secure data such as symmetric and asymmetric encryption and hashing.
- [Narrator] Cyberattacks propagate the news … on a daily basis. … Reports surface on attackers stealing terabytes … of sensitive information, personal data … and compromised emails. … Stealing company information and trade secrets … is a well known challenge … that businesses strive to protect against. … However, it can go undetected, as many times companies … don't notice any abnormal network activity. … I'm at this webpage, data records lost or stolen since 2013 … and also we can see some top breaches. … This is a very large number, … and I want you to take note of this: … only 4% of the breaches were secure breaches, … where encryption was used … and the stolen data was rendered useless. … We use cryptographic techniques to ensure confidentiality, … integrity and authentication of data, … whether in motion or at rest. … Data is in motion while traveling through the network, … moving from place to place. … Data is at rest while on a drive, … cloud storage or removable media. … Today, encryption is the most effective way …
- Define “passphrase.”
- Recall the purpose of multifactor authentication.
- Identify the tool used in today’s Windows operating systems to secure the file system.
- Explain what happens when a file is moved into a folder with permissions.
- Name the authentication protocol used in Active Directory.
- Recognize the location of the audit logs.
- Summarize the purpose of hardening.
- Explain the purpose of cryptographic techniques.
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 35m Beginner
IT Security: Key Policies and Resourceswith Gregory Michaelidis23m 44s Intermediate
1. Understand User Authentication
2. Understand Permissions
3. Dissecting Audit Policies
4. Server Protection
5. Providing email protection
6. Understand Encryption
Next steps1m 3s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.