Lisa Bock reviews symmetric encryption, which uses a single shared secret key to provide fast, efficient encryption with low overhead.
- [Instructor] Symmetric encryption is also called … conventional encryption, and uses … a single shared secret key. … Symmetric encryption has five ingredients. … The plain text, the encryption algorithm, … a shared secret key, ciphertext, … and the decryption algorithm, which is simply … the encryption algorithm run in reverse. … To give you an idea of what it looks like … when text is encrypted, I'm at this website. … In here, I'll put my plain text, … and then the key of the encryption we'll keep simple. … I'll put Roxy. … And here we can choose 128, 192, or 256-bit encryption. … We'll stay with 128 and say encrypt. … Down below is what you can see when text is encrypted. … Symmetric algorithms include Data Encryption Standard, … Triple DES, IDEA, and Advanced Encryption Standard … to provide fast, efficient encryption with low overhead. … We use symmetric encryption to provide … confidential online communications, … such as an SSL/TLS transaction, … or Secure Multi-purpose Internet Mail Extensions, …
- Define “passphrase.”
- Recall the purpose of multifactor authentication.
- Identify the tool used in today’s Windows operating systems to secure the file system.
- Explain what happens when a file is moved into a folder with permissions.
- Name the authentication protocol used in Active Directory.
- Recognize the location of the audit logs.
- Summarize the purpose of hardening.
- Explain the purpose of cryptographic techniques.
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 35m Beginner
IT Security: Key Policies and Resourceswith Gregory Michaelidis23m 44s Intermediate
1. Understand User Authentication
2. Understand Permissions
3. Dissecting Audit Policies
4. Server Protection
5. Providing email protection
6. Understand Encryption
Next steps1m 3s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.