Where is AI Essential's ?

Yes, I've noticed that when students show me videos from whatever dude decided to a do a course and sell it for less than 10 bucks, a completely unethical move. I don't know why Udemy allows that? Maybe their QC is really low.... I direct the kids to the CompTIA academic store....
Any video series, online course, or any other online content that is free or drastically inexpensive is usually of poor quality. Students don't know the difference and think that they should be able to find resources for less than $50 for a certification. Trainers who devalue education like that are doing a disservice to the students, the training profession, the certification organizations, and the tech industry.

CIN Sneak Peek CloudNetX CNX-001

It is time! The brand new CompTIA certification for advanced networking, CloudNetX CNX-001 is coming! Join us as we welcome @jasoneckert who will share his insights from an industry network architect and instructor experience. Join the conversation as we discuss various types of scenarios and ways to prepare students for the exam when it is released in 2025.

The CompTIA CloudNetX+ certification exam will:
  • Validate skills in advanced network and system architecture for designing and managing complex, hybrid, IT infrastructures.
  • Be designed around the tasks performed by a network architect, infrastructure architect, enterprise architect and cloud architect.
  • Be a natural progression for the job roles aligned to CompTIA Network+ and CompTIA Cloud+
What: CIN Sneak Peek Series CloudNetX CNX-001
When: December 12, 2024, 1:00-3:00 pm CDT
Who: Jason Eckert
Where: ON24
REGISTER HERE

06689 CIN Webinar Banners-06.png
View attachment 2078
Registered.

Core goals of information security

Data can be encrypted and processed without first requiring decryption thanks to homomorphic encryption. This implies that calculations can be made on encrypted data and that the outcomes are identical to those obtained from operations on the plaintext once they have been decrypted. Because it permits the safe processing and analysis of sensitive data (such as financial records and personal information) without disclosing it during calculation, it is essential for the encryption of data in use. This ensures privacy while permitting practical operations.
Thank you for your explanation
  • Like
Reactions: precious

Core goals of information security

Data can be encrypted and processed without first requiring decryption thanks to homomorphic encryption. This implies that calculations can be made on encrypted data and that the outcomes are identical to those obtained from operations on the plaintext once they have been decrypted. Because it permits the safe processing and analysis of sensitive data (such as financial records and personal information) without disclosing it during calculation, it is essential for the encryption of data in use. This ensures privacy while permitting practical operations.

7 Vulnerabilities That You Can Never Patch

@Rick Butler
My students usually get easily confused on command number 6 "Security through obscurity is never good policy", since during cryptography session, I teach them three principles that strong ciphers follow to ensure secrecy- Confusion, diffusion and obfuscation. For example, in symmetric encryption, obfuscation makes the ciphertext look random and hard to decipher. On other hand I also tell them that the workings of cryptographic algorithms for example in public key cryptography, like RSA, the algorithm's workings are publicly known and easy to understand—it's the private key that ensures security, not the secrecy of the algorithm itself. This contrast can be tricky for students, as they struggle to grasp why obfuscation works in some cases (like symmetric ciphers) but not in others (like RSA). Ever had similar or realted experience with your students?

Filter