You often need to add security to existing, insecure protocols. In this video, Mike Chapple explains the use of secure protocols for system administration, file transfer, and other applications.
- [Instructor] Many of the protocols that we … rely upon today were designed without security in mind, … and they don't have built-in encryption. … They require modification to support … secure encryption technology. … The most common example of adding encryption … to a standard protocol is for securing web communications. … You may be familiar with the HTTP protocol … that's used to deliver websites … to browsers over the internet. … That's where the HTTP in a URL comes from. … For example, here I'm visiting the website … that the federal government runs for accessibility. … When I look at the address bar, … I see that it does not have the lock indicating … that it uses encryption. … If I look at the actual URL here, … I also see there's no HTTPS. … This communication is taking place … over the standard HTTP protocol. … It's not encrypted, … and anyone who can eavesdrop on my network connection … will be able to see what I'm doing on this website. … On the other hand, if I change this URL manually …
- Block storage types
- Cloud storage security threats
- Encryption basics
- Choosing encryption algorithms
- Key management
- Public key infrastructure (PKI)
- Creating and revoking digital signatures
- Securing common protocols
- Data protection
- Information management
- Information rights management
- Logging security events
- Continuous security monitoring
Skill Level Intermediate
CompTIA Cloud+ (CV0-002) Cert Prep: 2 Securitywith Joseph Holbrook1h 31m Intermediate
1. Cloud Data Storage
3. Key Management
4. Public Key Infrastructure
5. Cryptographic Applications
6. Data Protection
7. Information Management
8. Data Event Auditability
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.