O'Reilly logo

GSEC GIAC Security Essentials Certification All-in-One Exam Guide by Ric Messier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
8
Encryption
In this chapter, you will learn about:
•  Asymmetric versus symmetric encryption
•  SSL/TLS
•  X.509 certificates
image
As long as people have been sharing information, there have been reasons to try to keep that information private. Let’s face it: People are just not very good at keeping secrets. Because of that, we need to have ways of protecting the information we send from one person to another. Historically, it’s been the military that has been a primary driver of encryption techniques. It’s not your spouse you most want to keep information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required