Key Takeaways - Applied Cryptography

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
35 hours 10 minutes
Difficulty
Advanced
CEU/CPE
35
Video Transcription
00:00
Hello and welcome back. The cyber is comped e A certified advance security practice. Tres certification preparation course we continue on with Marginal before witches title apply photography
00:13
Here again where the top is that? We discussed doing this particular martyr up to this point in time At this point in time, what we're gonna do not turn on teaching award Some terms that you need to know for this particular marshall
00:25
here, get us some terms we discussed. We discuss hashing, salting, symmetric, asymmetric encryption, digital signatures, non repudiation, steganography.
00:36
We looked at the hipper or health insurance portability Accountability Act. So brings on silly act Gramm Leach Bailey act, family educational rights and privacy
00:45
payment. Car industry data security started as well. It's photography Discussed what that mean in terms from a terminology standpoint PGP we looked at PM in that security would discuss virtual private networking
00:58
Internet security tool set
01:00
It's the sale TSL
01:03
we discuss secure h g p
01:06
i p sec l to tp public infrastructure Web trusts discussed invitation of security protocols, critter graphical attacks, public key infrastructure and lastly, PGP any upcoming module margin number five, we'll be discussing integrated whole security and again I look forward to seeing you on the natch module
Up Next