Episode 3 | Fundamentals of Cryptography: Hashing, Encryption & Quantum Threats | BCIS 4345

? Welcome to Episode 3 of the BCIS 4345: Network and System Security Podcast, hosted by Dr. Joseph H. Schuessler from the Dr. Sam Pack College of Business at...

Joseph H.Schuessler43 views55:39

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Pakistan under the topic 'bigg boss 19 full episode'.

About this video

🎙 Welcome to Episode 3 of the BCIS 4345: Network and System Security Podcast, hosted by Dr. Joseph H. Schuessler from the Dr. Sam Pack College of Business at Tarleton State University. In this episode, we explore the fundamentals of cryptography—the science of securing data through algorithms and keys. From hashing and symmetric/asymmetric encryption to blockchain applications and the emerging challenges of quantum computing, this discussion highlights how cryptography is both a powerful defense and a system with limitations attackers seek to exploit. Based on the text: Ciampa, M. (2025). CompTIA Security+ Guide to Network Security Fundamentals (8th ed.). Cengage. https://www.cengage.com/c/new-edition/9798214000787/ 📘 Created with NotebookLM, Google’s AI-powered research assistant that integrates your course content into a connected learning experience. 🔗 Explore the interactive notebook: NotebookLM Companion https://notebooklm.google.com/notebook/2401923e-53f0-4d8e-a893-1e0732bed9ee?artifactId=2bad09d5-fe9d-45e9-811d-0576e639c3d0 🔗 For questions regarding this course, please reach out to Dr. Schuessler's Teaching Assistant: https://chatgpt.com/g/g-68a8751d22788191a9e0733bd9f44bf9-bcis-4345-network-and-systems-security 🔍 Key Topics Covered: 🔐 Defining Cryptography – Hiding messages vs. hiding meaning (steganography vs. encryption) 🔑 Cryptographic Algorithms – Hashing, symmetric (AES, 3DES, RC, Blowfish, Twofish), asymmetric (RSA, ECC, DSA) 💾 Software & Hardware Encryption – File system encryption, BitLocker, self-encrypting drives, HSMs, TPMs, and TEEs 📊 Blockchain Security – Immutable ledgers and SHA-256 in distributed trust ⚠️ Cryptographic Limitations & Attacks – Key length, weak keys, algorithm attacks, collisions, birthday attacks ⚛️ Quantum Computing Threats – Quantum cryptography, quantum communication, and post-quantum defenses 🎓 CompTIA Security+ Alignment – Core cryptography knowledge for IT, MIS, and CIS majors entering cybersecurity careers 📺 Watch the Full BCIS 4345 Series: BCIS 4345 Playlist https://www.youtube.com/playlist?list=PLRU5YMNncPaot28FOZlxoDIDuluj45y9g 🔗 Explore More BCIS Podcasts You May Like: • https://www.youtube.com/playlist?list=PLRU5YMNncPaqUbrPJXlS1t1YIOOIbwwCm • https://www.youtube.com/playlist?list=PLRU5YMNncPaob4xqmqrx5_VyvYvfc54xW • https://www.youtube.com/playlist?list=PLRU5YMNncParSkh1iYUHD4weh4qvpXrwR • https://www.youtube.com/playlist?list=PLRU5YMNncPaqM6860sJUUlL0PCEyggK_K • https://www.youtube.com/playlist?list=PLRU5YMNncPapL3JvXOaiVNckBY3-0JNQS • https://www.youtube.com/playlist?list=PLRU5YMNncPaoOozvXkDTSY1iqjsC42n4u • https://www.youtube.com/playlist?list=PLRU5YMNncPaqN14zaj_InWi8R8w9qhjTt 👍 If this episode helped you understand the foundations of cryptography and its role in cybersecurity, like, subscribe, and share with classmates. 🛎 Turn on notifications to follow along with the full series. 🗨️ Discussion Prompt: Do you think quantum computing will completely break current encryption methods, or will post-quantum cryptography keep us secure? Why?

Video Information

Views
43

Total views since publication

Likes
1

User likes and reactions

Duration
55:39

Video length

Published
Aug 22, 2025

Release date

Quality
hd

Video definition

Captions
Available

Subtitles enabled