O'Reilly logo

Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) by Mike Meyers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

MODULE 8

Cryptographic Methods

In Module 7, we introduced you to the world of cryptography. In this module and the following modules, we’ll go more in-depth on topics we only lightly introduced earlier. In this module we are going to focus on cryptographic methods, primarily on algorithms. We’ll cover these algorithms in detail, highlighting their features, characteristics, and common use. You’ll definitely be expected to understand how various cryptographic algorithms work for the exam, and, more importantly, in your daily life as a Security+ certified professional.

Cryptographic Algorithms

In the previous module, we described the basics of algorithms and keys, the two components necessary to make the encryption and decryption processes work. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required