🎙 Welcome to Episode 4 of the BCIS 4345: Network and System Security Podcast, hosted by Dr. Joseph H. Schuessler from the Dr. Sam Pack College of Business at Tarleton State University.
In this episode, we move beyond the basics of encryption and dive into advanced cryptography—where trust, authentication, and secure communication take center stage. From digital certificates and Public Key Infrastructure (PKI) to TLS, IPSec, and secure transport protocols, we explore how organizations protect data in transit and ensure integrity in a connected world.
Based on the text: Ciampa, M. (2025). CompTIA Security+ Guide to Network Security Fundamentals (8th ed.). Cengage. https://www.cengage.com/c/new-edition/9798214000787/
📘 Created with NotebookLM, Google’s AI-powered research assistant that integrates your course content into a connected learning experience.
🔗 Explore the interactive notebook: NotebookLM Companion https://notebooklm.google.com/notebook/5774e1bd-65aa-433e-a6ca-cf3af53590df?artifactId=6955cb78-e5ab-4604-8be7-046b7e54e672
🔗 For questions regarding this course, please reach out to Dr. Schuessler's Teaching Assistant: https://chatgpt.com/g/g-68a8751d22788191a9e0733bd9f44bf9-bcis-4345-network-and-systems-security
🔍 Key Topics Covered
📜 Digital Certificates – Root, domain, wildcard, SAN, and code signing certificates
🏛 Public Key Infrastructure (PKI) – Trust models (hierarchical, distributed, bridge), certificate policies, and lifecycle management
🔑 Key Management – Secure storage, usage, and handling procedures
🔒 Secure Protocols – TLS, IPSec (AH & ESP), HTTPS, SSH, S/MIME, SRTP
⚡ Implementing Cryptography – Key strength, secret algorithms, and block cipher modes
🎓 CompTIA Security+ Alignment – Essential PKI and secure communication knowledge for IT, MIS, and CIS majors pursuing cybersecurity careers
📺 Watch the Full BCIS 4345 Series: BCIS 4345 Playlist https://www.youtube.com/playlist?list=PLRU5YMNncPaot28FOZlxoDIDuluj45y9g
🔗 Explore More BCIS Podcasts You May Like:
• https://www.youtube.com/playlist?list=PLRU5YMNncPaqUbrPJXlS1t1YIOOIbwwCm
• https://www.youtube.com/playlist?list=PLRU5YMNncPaob4xqmqrx5_VyvYvfc54xW
• https://www.youtube.com/playlist?list=PLRU5YMNncParSkh1iYUHD4weh4qvpXrwR
• https://www.youtube.com/playlist?list=PLRU5YMNncPaqM6860sJUUlL0PCEyggK_K
• https://www.youtube.com/playlist?list=PLRU5YMNncPapL3JvXOaiVNckBY3-0JNQS
• https://www.youtube.com/playlist?list=PLRU5YMNncPaoOozvXkDTSY1iqjsC42n4u
• https://www.youtube.com/playlist?list=PLRU5YMNncPaqN14zaj_InWi8R8w9qhjTt
👍 If this episode helped you understand advanced cryptography and its role in securing modern networks, like, subscribe, and share with classmates.
🛎 Turn on notifications to follow along with the full series.
🗨️ Discussion Prompt: Which secure protocol—TLS, IPSec, or SSH—do you think will remain the most critical in the next decade of cybersecurity? Why?