Video: Information Security – How Cryptography Works (Choosing the Right Crypto for the Right Job)

Home > Blogs > Security > Video: Information Security – How Cryptography Works (Choosing the Right Crypto for the Right Job)

Video: Information Security – How Cryptography Works (Choosing the Right Crypto for the Right Job)

Like This Blog 0 Mike Danseglio
Added by May 1, 2012

Information Security Expert, Interface Technical Training Director and CISSP / CEH Instructor Mike Danseglio presented at the Security BSides event in Tempe, AZ on February 18th, 2012. Mr. Danseglio’s topic was How Cryptography Works (Choosing the Right Crypto for the Right Job). Here is the 3-part video of his presentation:
Video 1 of 3
Video 2 of 3
Video 3 of 3
Abstract:
Key sizes, algorithms and elliptic curves make a difference in data protection. The more you learn about these properties, the better you will understand enough to make informed decisions that balance security, usability and performance. Dissecting a few representative algorithms shows how they work, as well as what the bit-strength actually means and how it differs between algorithms. Learn how public-key and shared-secret-key play together in real-world scenarios and how to choose the right algo+keylength for IT application scenarios, including PKI, IPSec and Kerberos. Also, it’s important to be familiar with the Diffie-Hellman method, which provides both strength and weakness to the entire framework. About the Presenter: Mike Danseglio has worked in the IT field for more than 20 years. He is an award-winning author, public speaker and instructor on security, virtualization, cloud computing, wireless and wired networking and IT lifecycle processes. His security work has protected military organizations, government agencies and private companies worldwide. Danseglio performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations. Mike has developed and taught extensive security training on cryptography, security technology, attacks and countermeasures. His published works on computer security include Microsoft product security guides as well as security recommendations from the National Security Agency (NSA). For a list of courses that Mike is teaching visit his instructor page at Interfacett.com

Videos You May Like

A Simple Introduction to Cisco CML2

0 3624 0

Mark Jacob, Cisco Instructor, presents an introduction to Cisco Modeling Labs 2.0 or CML2.0, an upgrade to Cisco’s VIRL Personal Edition. Mark demonstrates Terminal Emulator access to console, as well as console access from within the CML2.0 product. Hello, I’m Mark Jacob, a Cisco Instructor and Network Instructor at Interface Technical Training. I’ve been using … Continue reading A Simple Introduction to Cisco CML2

Government Edition – Encrypting a USB Flash Drive in Windows 10

0 265 2

In this video, Security Instructor Mike Danseglio demonstrates how to use BitLocker in Window 10 to secure files on a USB Flash drive that adhere to stricter data protection requirements as found inside Government entities. BitLocker 2-day instructor-led training is now available at Interface: BITLOCK: Planning and Deploying BitLocker Drive Encryption Training Video Transcription: Hi. … Continue reading Government Edition – Encrypting a USB Flash Drive in Windows 10

Configuring Windows Mobility Center and How to Turn it On and Off

1 1402 1

Video transcription Steve Fullmer: In our Windows training courses, we often share information about the Windows 8.1 Mobility Center. Mobility Center was introduced for mobile and laptop devices in Windows 7. It’s present and somewhat enhanced in Windows 8. Since we don’t have mobile devices in our classrooms, I decided to take a little bit … Continue reading Configuring Windows Mobility Center and How to Turn it On and Off

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.