Cryptography requires a great deal of mathematical computation and, therefore, is fairly slow. Engineers often make cryptography more efficient by building special-purpose computer hardware that is designed specifically for encryption and decryption. In t
- [Instructor] Cryptography requires…a great deal of mathematical computation,…and therefore it's fairly slow.…Engineers often make cryptography more efficient…by building special-purpose hardware…that is designed specifically for encryption and decryption.…As you learned when we covered SSL and TLS,…the two systems participating in an SSL or TLS communication…go through a complex handshaking process…where they discover the cipher suites…that each system supports, select a common algorithm,…and then generate a session key to be used…for the remainder of the communication.…
The process of selecting ciphers…and generating a session key is quite difficult…from a mathematical perspective, and for that reason…it is often a bottleneck for web servers…and other devices that participate in…many different TLS sessions simultaneously.…SSL and TLS accelerators are special-purpose hardware…designed specifically to complete…the SSL and TLS handshaking process.…When a device begins this process,…it hands control over to the accelerator,…
- IP addresses
- Routers, switches, and bridges
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Managing secure networks
- Tuning and configuring SIEMs
- Troubleshooting digital certificates
- Personnel, host, and mobile device security
- Mobile device management and tracking
- Securing common protocols
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 13m Beginner
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. TCP/IP Suite
2. Network Security Devices
3. Managing Secure Networks
4. Wireless Networking
5. Security and Monitoring Technologies
6. Security Assessment Tools
7. Security Troubleshooting
8. Personnel Security
9. Host Security
10. Mobile Device Security
11. Securing Protocols
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.