Cryptography is the key to understanding how encryption works. In this video, learn the basics of cryptography.
- [Instructor] In order to help understand … how encryption works … within a server system, … you need to first understand … a very basic concept called cryptography. … Now, to put a very simple definition … on this word cryptography, … we're going to say that it's the concept … of applying an algorithm to plaintext … in order to convert it over into ciphertext. … So what do we mean by that? … Well, I have an example here for you. … Let's say we have an algorithm that says go up two letters, … and let's say we have the word sample … which is just in plaintext, right, just sample. … We can read that easy. … What we do is we take each letter … and we increase by two letters. … So if we take the letter s in sample, … and we go up two letters, … you go s, t, u, right, that's two letters, … so you put a u where the s is. … Take the a, go up two letters, b, c. … You put a c where the a is, … and we could continue through this process … and you'll see that the word sample becomes the word, …
Author
Released
6/21/2019- Implementing the Encrypting File System (EFS)
- Protecting your servers from malware
- Common network threats
- Implementing IPsec
- Securing file services
- Delegating privileges
- Configuring account lockout policies
- Managing advanced audit policies
Skill Level Intermediate
Duration
Views
Related Courses
-
Windows Server 2019: Implementing Group Policy
with Ed Liberman1h 25m Intermediate -
Windows Server 2019 Essential Training
with Scott M Burrell3h 18m Intermediate -
Learning Cryptography and Network Security (2015)
with Lisa Bock1h 45m Intermediate
-
Introduction
-
1. Server Hardening
-
Cryptography4m 5s
-
Public key encryption4m 29s
-
EFS overview4m 15s
-
Implementing EFS4m 6s
-
Malware protection4m 28s
-
-
2. Secure the Network
-
Network security threats4m 34s
-
Implementing IPSec6m 37s
-
-
3. Secure File Services
-
Quota templates4m 4s
-
Create quotas5m 1s
-
File screening5m 38s
-
4. Manage Privileged Identities
-
User rights4m 22s
-
Delegate privileges4m 39s
-
Create a taskpad4m 43s
-
Password policies5m 20s
-
Account lockout policies4m 41s
-
-
5. Configure Advanced Audit Policies
-
Audit policy3m 43s
-
Audit object access4m 38s
-
Manage advanced audit policy3m 12s
-
-
Conclusion
-
Next steps16s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Cryptography