No video

Cryptography - CompTIA Security+ Performance Based Question

  Рет қаралды 32,065

Cyberkraft

Cyberkraft

Күн бұрын

The Cyberkraft SY0-601 Bootcamp will fully prepare you for the Security+ exam with 40 hours of LIVE virtual training:
cyberkrafttrai...
Get certified in one week and make average yearly salary of $85,000.
This bootcamp includes:
• 40 hours of live instruction over five days of instruction
• All five domains
• Access to the Official CompTIA Security+ Learn and Labs Environment
• Over 1000 pages of PDF study guides
• 12 practice tests and 4 simulation exams (300+ total questions) to fully prepare you for test day
• Weekly study sessions and live support
• Exam fee included
• Second Shot Guarantee - If you don’t pass the first attempt, we will pay for your second exam
Or, try our self-paced training option and study on a schedule of your choosing!
cyberkrafttrai...
Cyberkraft is a CompTIA Authorized Partner.
Questions?
[info@cyberkrafttraining.com]

Пікірлер: 30
@lbstepheezy
@lbstepheezy Жыл бұрын
Why is the drop down menus not populating to see the other options
@thvqt
@thvqt 10 ай бұрын
he probably is recording the browser, and the drop down menu could potentially be a pop-out window
@JoseRodriguez-du3nz
@JoseRodriguez-du3nz Жыл бұрын
Thank you!! The community appreciates you.
@christianomizzle
@christianomizzle Жыл бұрын
Wow!! So glad I ran into your channel. Just what I needed, thank you!! :)
@Peacekeeper_84
@Peacekeeper_84 3 ай бұрын
Mike Meyers told me that the public key only works to encrypt and the private key is only used to decrypt. In this case, is Alice who is generating the private and public key, meaning that her private key can only decrypt and her public key can only encrypt. I'm so confused right now
@cyberkraft1
@cyberkraft1 2 ай бұрын
You can use your private key to encrypt a message. When you do, it can only be decrypted with your public key. Another person can also encrypt a message using your public key. This means that the message can only be decrypted with your private key. The first example is much more common, but both techniques can be used.
@TechAceYoutube
@TechAceYoutube Ай бұрын
The concept is just reversed with digital signatures.
@tomasmalisauskas608
@tomasmalisauskas608 Жыл бұрын
Amazing explanations. Preparing for my security + with your stuff. Thanks!
@user-kh4wj3ds9v
@user-kh4wj3ds9v 2 ай бұрын
Isn't Alice supposed to encrypt the data/message using Bob's public key so that only Bob can decrypt it with it's private key ?
@bblane08
@bblane08 6 ай бұрын
Great explanation
@wroadwayresearch
@wroadwayresearch 10 ай бұрын
this is what perfect exactly what I needed thank you!
@calebservi
@calebservi 2 ай бұрын
Are all your 601 PBQ videos applicable to 701 as well?
@cstyles419
@cstyles419 4 ай бұрын
for number 2 of the second question, how is that the command to change the password when the code itself does not actually address changing the password? It just says "C:Users\Administrator etuser\Administrator(again)", then suddenly you can throw in a password on that line?
@0311nate
@0311nate 4 ай бұрын
Have any of these practice ones ever been on real exam for anyone?
@Griffination
@Griffination Жыл бұрын
Thank you!
@Grape-O
@Grape-O Жыл бұрын
Thank you for this
@Hammmmyy
@Hammmmyy Жыл бұрын
thank you!
@maa11235
@maa11235 Жыл бұрын
How did you get access to the PBQs to use to study? Do I need to buy them somehow from CompTIA?
@cyberkraft1
@cyberkraft1 Жыл бұрын
Great question! These are accessible through the CompTIA Learn+Labs environment. You will get access to all of the PBQs when you enroll in one of our courses. We have self-paced and instructor-led courses available. When you enroll in our self-paced course you'll get access to the Learn+Labs environment for a cheaper price AND you'll receive 25 hours of video lessons just like this one. Self-paced cyberkrafttraining.com/security-plus-sp/ Instructor-led cyberkrafttraining.com/security-plus-spb/
@leticia9769
@leticia9769 Жыл бұрын
I'm confused with the keys, I thought you encrypt with your public key, and decrypt with private key?
@cyberkraft1
@cyberkraft1 Жыл бұрын
Keys can be very confusing. If you are sending a message, you would encrypt using your private key. Anyone receiving the message would decrypt it using your public key. This proves to the recipient that you were the author of the message.
@Jetmechjr
@Jetmechjr Жыл бұрын
My understanding is that when you send an encrypted message using public key cryptography, you would encrypt it with the recipient's public key so that only they can decrypt it with their private key. Nobody else can decrypt the message because you cannot decrypt with the same key used to encrypt (the recipient's public key in this case), and thus you ensure only the holder of the private key can decrypt it. However, the point of a digital signature is to verify the integrity of the message. When encrypting a digital signature, you encrypt it with your private key, and thus create a *unique* digital signature that can only be decrypted by your public key. This allows one to be certain that the digital signature indeed originated from you, and they can then verify your decrypted hash of the original message against the results of their own hashing of the message. If a threat actor performed an on-path attack and/or otherwise modified the contents of the email, when Bob performs his own SHA hash of the message it would differ from the hash contained within the Digital Signature.
@leticia9769
@leticia9769 Жыл бұрын
@@Jetmechjr Ohhh okay I was confusing cryptography encryption with the digital signature. You explained that really well, thank you so much !!!
@leticia9769
@leticia9769 Жыл бұрын
@@cyberkraft1 your videos and explanations rock, thank you!
@dondups1543
@dondups1543 Жыл бұрын
Hello ho dose it work wen d receiver sends d msg back ie private / public keys etc? Thanks me confused
@cyberkraft1
@cyberkraft1 Жыл бұрын
Great question! So when the receiver of the message sends a reply they would sign the message using their private key. Then, the receiver of that message (the original sender) would use the sender's public key.
@dondups1543
@dondups1543 Жыл бұрын
Thanks,thought so wat Abt that fancy word ephemeral keynhas expired how dose d receive gt to read msg is contact sender😮
@QuyenNHokom
@QuyenNHokom 6 ай бұрын
You would think that a "public" key is used to encrypt data and only a "private" key could actually decrypt the data lol
@darandomizer2
@darandomizer2 5 ай бұрын
It's based on availability of the key. A public key is available tot he public, and a private key is kept secret. If everyone had access to the private key, then it would defeat the purpose of encrypting the message!
@ReDeTiCTT
@ReDeTiCTT 4 ай бұрын
@@darandomizer2 each key could do either it depends on what you pick
Ik Heb Aardbeien Gemaakt Van Kip🍓🐔😋
00:41
Cool Tool SHORTS Netherlands
Рет қаралды 9 МЛН
Schoolboy Runaway в реальной жизни🤣@onLI_gAmeS
00:31
МишАня
Рет қаралды 3,7 МЛН
Вы чего бл….🤣🤣🙏🏽🙏🏽🙏🏽
00:18
Security+ Certification SY0-701 50 Practice Questions
1:10:03
Technical Institute of America
Рет қаралды 119 М.
Cloud Security - CompTIA Security+ Performance Based Question
19:52
Security+ all acronyms
21:14
Acromos
Рет қаралды 61 М.
Security+ Performance Based Questions (PBQs) SY0-601 Practice
11:04
Vincent Humble
Рет қаралды 40 М.
Ik Heb Aardbeien Gemaakt Van Kip🍓🐔😋
00:41
Cool Tool SHORTS Netherlands
Рет қаралды 9 МЛН