Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Certified: The CompTIA Security+ Audio Course

Episode 27: Advanced Cryptographic Techniques (Domain 1)

15 Jun 2025

Description

Modern threats require advanced cryptographic responses, and in this episode, we explore the techniques that strengthen authentication, protect weak credentials, and secure transactional data at scale. We begin with key stretching—methods like bcrypt, PBKDF2, and scrypt that increase the computational time needed to brute-force a password hash, adding layers of defense even when password quality is poor. These functions are particularly important in systems that store massive numbers of credentials and are frequently targeted by attackers. We also introduce blockchain technology as a decentralized method of achieving data integrity through distributed consensus, exploring how each block is cryptographically linked to the one before it to prevent tampering. While most famous for cryptocurrency, blockchain’s uses in cybersecurity include supply chain security, digital notarization, and distributed identity. Finally, we explain the concept of open public ledgers and the role of hashing in blockchain consensus algorithms. These advanced techniques push the boundaries of trust, resilience, and verifiability in distributed systems and high-stakes digital environments.

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.