Episode 4 | Advanced Cryptography: PKI, Digital Certificates & Secure Protocols | BCIS 4345

? Welcome to Episode 4 of the BCIS 4345: Network and System Security Podcast, hosted by Dr. Joseph H. Schuessler from the Dr. Sam Pack College of Business at...

Joseph H.Schuessler49 views17:54

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

🎙 Welcome to Episode 4 of the BCIS 4345: Network and System Security Podcast, hosted by Dr. Joseph H. Schuessler from the Dr. Sam Pack College of Business at Tarleton State University. In this episode, we move beyond the basics of encryption and dive into advanced cryptography—where trust, authentication, and secure communication take center stage. From digital certificates and Public Key Infrastructure (PKI) to TLS, IPSec, and secure transport protocols, we explore how organizations protect data in transit and ensure integrity in a connected world. Based on the text: Ciampa, M. (2025). CompTIA Security+ Guide to Network Security Fundamentals (8th ed.). Cengage. https://www.cengage.com/c/new-edition/9798214000787/ 📘 Created with NotebookLM, Google’s AI-powered research assistant that integrates your course content into a connected learning experience. 🔗 Explore the interactive notebook: NotebookLM Companion https://notebooklm.google.com/notebook/5774e1bd-65aa-433e-a6ca-cf3af53590df?artifactId=6955cb78-e5ab-4604-8be7-046b7e54e672 🔗 For questions regarding this course, please reach out to Dr. Schuessler's Teaching Assistant: https://chatgpt.com/g/g-68a8751d22788191a9e0733bd9f44bf9-bcis-4345-network-and-systems-security 🔍 Key Topics Covered 📜 Digital Certificates – Root, domain, wildcard, SAN, and code signing certificates 🏛 Public Key Infrastructure (PKI) – Trust models (hierarchical, distributed, bridge), certificate policies, and lifecycle management 🔑 Key Management – Secure storage, usage, and handling procedures 🔒 Secure Protocols – TLS, IPSec (AH & ESP), HTTPS, SSH, S/MIME, SRTP ⚡ Implementing Cryptography – Key strength, secret algorithms, and block cipher modes 🎓 CompTIA Security+ Alignment – Essential PKI and secure communication knowledge for IT, MIS, and CIS majors pursuing cybersecurity careers 📺 Watch the Full BCIS 4345 Series: BCIS 4345 Playlist https://www.youtube.com/playlist?list=PLRU5YMNncPaot28FOZlxoDIDuluj45y9g 🔗 Explore More BCIS Podcasts You May Like: • https://www.youtube.com/playlist?list=PLRU5YMNncPaqUbrPJXlS1t1YIOOIbwwCm • https://www.youtube.com/playlist?list=PLRU5YMNncPaob4xqmqrx5_VyvYvfc54xW • https://www.youtube.com/playlist?list=PLRU5YMNncParSkh1iYUHD4weh4qvpXrwR • https://www.youtube.com/playlist?list=PLRU5YMNncPaqM6860sJUUlL0PCEyggK_K • https://www.youtube.com/playlist?list=PLRU5YMNncPapL3JvXOaiVNckBY3-0JNQS • https://www.youtube.com/playlist?list=PLRU5YMNncPaoOozvXkDTSY1iqjsC42n4u • https://www.youtube.com/playlist?list=PLRU5YMNncPaqN14zaj_InWi8R8w9qhjTt 👍 If this episode helped you understand advanced cryptography and its role in securing modern networks, like, subscribe, and share with classmates. 🛎 Turn on notifications to follow along with the full series. 🗨️ Discussion Prompt: Which secure protocol—TLS, IPSec, or SSH—do you think will remain the most critical in the next decade of cybersecurity? Why?

Video Information

Views
49

Total views since publication

Likes
1

User likes and reactions

Duration
17:54

Video length

Published
Aug 23, 2025

Release date

Quality
hd

Video definition

Captions
Available

Subtitles enabled

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.