CertMike Explains Digital Signatures

Sdílet
Vložit
  • čas přidán 13. 06. 2021
  • Digital signatures use cryptography to provide authentication, integrity assurance, and non-repudiation for digital data. The creation and verification of digital signatures is also a crucial topic for the CISSP, Security+, CISM, CCSP, CySA+ and other cybersecurity exams.
    In this video, certification and cybersecurity expert Mike Chapple breaks down the basics of digital signatures to help you prepare for your exam.
    Learn more about Mike's full certification preparation programs at www.certmike.com/
    #cybersecurity #CertMike #digitalsignatures #encryption #CISSP #cryptography #nonrepudiation #certification

Komentáře • 16

  • @TimVerdouw-itmobilesupport

    So there is no Confidentality in digital signatures, just Integrity, authentication and Non-repudiation. That helps. Thanks Mike.

    • @hellosans
      @hellosans Před rokem +1

      if you want confidentiality, you need to encrypt digitally signed Doc with senders public key

  • @camdyn8251
    @camdyn8251 Před 3 lety

    Thank you Mike, I’m preparing for my CISSP and this was very helpful!

  • @mamun001
    @mamun001 Před rokem

    You explain things so well

  • @jeyseelan3556
    @jeyseelan3556 Před 2 lety

    Great explanation

  • @vermaji-pt4ez
    @vermaji-pt4ez Před rokem

    Very helpful 👍

  • @somethingnew3338
    @somethingnew3338 Před 3 lety

    Great vid

  • @supersmart671
    @supersmart671 Před 3 lety +1

    great explanation!!!

    • @conqueringleo
      @conqueringleo Před rokem

      agreed. CertMike, i'm gonna look at ALL of your clips

  • @miocid31
    @miocid31 Před 3 lety +2

    Great video and thanks for the explanation. Out of curiosity does this process also apply to eSignature platforms e.g. DocuSign or do they work differently?

    • @neilgedala
      @neilgedala Před 2 lety +1

      Hi Jose, in the sense that you use digital signatures to prove your identity to DocuSign (non-repudiation), basically.

    • @rahuljain-nm7gi
      @rahuljain-nm7gi Před rokem

      ...oo 🎈ookkkk

  • @hellosans
    @hellosans Před rokem +1

    Sir.. i have a question? "8:44" How can or by what method Susen know what hash algorithm i have used ?

  • @sar4432
    @sar4432 Před rokem

    Hi, what’s the difference between digital signature and digital certificate ?

  • @udaynj
    @udaynj Před rokem

    Mike, Nice video. What would happen if someone accidentally has a public key they used to decrypt your digital signature. What is the Private Key based on ? Your email address?

  • @TheNaresh136
    @TheNaresh136 Před rokem

    can you please remove the ad from the videos?