Cybersecurity Study Session | Encryption Edition

Happy Sunday!! On this Cybersecurity self-learning path, and let me just say my brain is being fed!

Today’s focus:

👩🏾‍💻Reviewed the basics of encryption

👩🏾‍💻Learned the difference between symmetric and asymmetric encryption

👩🏾‍💻Took notes on key terms like AES, RSA, public key, private key

👩🏾‍💻Completed a mini quiz to test my understanding

Anyone else doing self-paced programs? Let’s hold each other accountable!

#blackgirlintech #cybersecurity #lemon8studying #lemon8challenge

2025/4/6 Edited to

... Read moreHappy Sunday, fellow learners! Diving deep into cybersecurity has truly been an enriching experience, and this week's focus on encryption has been particularly eye-opening. While the basics are a great start, understanding the 'why' and 'how' behind these complex systems makes all the difference. After reviewing the fundamentals, I realized how crucial it is to grasp why we even need two main types of encryption: symmetric and asymmetric. Symmetric encryption, like AES (which I took notes on), is incredibly fast and efficient for encrypting large amounts of data. Think of it like a single key that both locks and unlocks a treasure chest; both sender and receiver need the exact same key. The challenge, of course, is securely sharing that secret key without anyone else getting their hands on it. This is where asymmetric encryption, such as RSA (another key term I studied), comes into play. Asymmetric encryption uses a pair of keys: a public key and a private key. Your public key can be freely shared with anyone – it's like an open mailbox where anyone can drop a letter. But only your private key, which you keep secret, can open that mailbox and read the letter. This clever design solves the key exchange problem. When you want to send a secure message, you use the recipient's public key to encrypt it. Only their corresponding private key can decrypt it. It also works the other way around for digital signatures, where you encrypt something with your private key, and others can verify it's from you using your public key, ensuring both authenticity and integrity – a concept that's vital for trust in digital communications. What's truly ingenious, and something I found super interesting during my study, is how these two methods are often combined in real-world applications. For instance, when you visit a secure website (HTTPS), your browser and the server first use asymmetric encryption (like RSA) to securely exchange a symmetric encryption key. Once that secret key is established, all subsequent data transfer uses the much faster symmetric encryption. This hybrid approach gives us the best of both worlds: the secure key exchange of asymmetric methods and the high-speed data encryption of symmetric methods. It might sound complicated, but the beauty is that for most users, these intricate processes happen seamlessly in the background. Software like PGP (Pretty Good Privacy), which I encountered in some advanced readings, exemplifies this. It handles all the complex key management, encryption, and digital signatures automatically, making secure communication accessible even for those without deep cryptographic knowledge. It’s all about protecting our data and ensuring our messages are both private and authentic. It's truly empowering to understand these layers of security, especially in today's digital landscape!

13 comments

Related posts

Free Cybersecurity Courses from IBM
If you are interested in Cybersecurity, these FREE courses from IBM make learning easy and accessible for everyone 1. Introduction to Hardware and Operating Systems. In this course you are going to learn about: * Demonstrate an understanding of operating system fundamentals. * Recognize deskto
Ivy League Help

Ivy League Help

1248 likes

Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

103 likes

5 Certifications I’m Getting in Cybersecurity 💻
im currently studying Cybersecurity/Digital Forensics, and these are the five certifications I’m earning to build real-world skills and long-term stability 💻✨ this field is about consistency, discipline, and strategy. every cert has a purpose, and every step compounds. soft life, but secure.
shay 💕

shay 💕

69 likes

3 cybersecurity jobs that pay well
1. Security Analyst - What They Do: Monitor networks for vulnerabilities, investigate breaches, and implement security measures. - How to Start: - Obtain certifications like CompTIA Security+ or CySA+. - Gain experience with tools like SIEM (e.g., Splunk). - Start in an I
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

628 likes

Top 3 Cybersecurity Certifications For Your Career
Want to break into the high-demand field of cybersecurity or advance your existing career? Here are the top 3 cybersecurity certifications that can open doors to exciting job opportunities and higher salaries! 🌟 🛡️ Certified Information Systems Security Professional (CISSP) Why It's Va
Pradeep M

Pradeep M

250 likes

Certifications That Can Change Your Life in 3 Mont
Certifications That Can Change Your Life in 3 Months You don’t need 4 years to change your career. Some certifications can make you job-ready in just 8–12 weeks — and recruiters actively look for them. If your goal is to get hired in 2025–2026, start with these: 1️⃣ AWS Certified Cloud Practiti
devswitchwithai

devswitchwithai

410 likes

5 entry level tech jobs for newbies 👩‍💻☁️
1. Entry-Level Software Engineer - What they do: Write and test code, work on software features, fix bugs, and collaborate with other developers. - Education: Bachelor’s degree in Computer Science, Software Engineering, or a related field. - Skills: Proficiency in programming langua
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

526 likes

Cybersecurity careers, I wish I knew sooner..
Discover the Cybersecurity Careers You Need to Know About 🔒 As someone who's been in the field, I'm sharing insights on two in-demand roles: 📊 Cybersecurity Analyst - Focuses on monitoring, detecting, and responding to security incidents - Requires strong analytical thinking and pro
Dominica Amauri

Dominica Amauri

69 likes

Cybersecurity Analyst Blueprint 🔐💼🚀
Here’s your game plan to become a cybersecurity analyst! 🗺️ 1. Build Your Base: Get solid with IT, networking, and basics like coding. Certifications like CompTIA Security+ or CEH will give your resume a boost. 📚 2. Get Hands-On: Create a home lab, join CTF challenges, or dive into open-source
Dominica Amauri

Dominica Amauri

121 likes

5 cybersecurity certifications for career boost
Hello everyone! Cybersecurity certifications offer professionals significant benefits by validating specialized skills and knowledge in areas like ethical hacking, network security, and cloud security. They enhance credibility, increase job prospects, and potentially boost earning potential. These
Yun Jung

Yun Jung

383 likes

Cybersecurity jobs for the non-tech girlies 👩🏽‍💻
Here are 3 career paths that I wish I knew about when I was trying to break into tech that focus on strategy, analysis, and human factors: 1. Governance, Risk, and Compliance (GRC): Shape organizational security policies and ensure regulatory compliance. Your analytical skills can help businesse
Dominica Amauri

Dominica Amauri

390 likes

Top Cybersecurity Certificates
There are several reputable cybersecurity certifications that can help you advance your skills and knowledge in the field of cybersecurity. 1. Certified Information Systems Security Professional (CISSP): - CISSP is a globally recognized certification that covers a wide range of cybersecurit
anjali.gama

anjali.gama

110 likes

3 must-study IT certifications
1. AWS Certified Solutions Architect – Associate 🌟 Why It’s Worth It: - Recognized globally as a leading cloud certification. - Equips you to design cost-efficient, scalable, and secure cloud solutions. - Highly sought-after by employers due to AWS's dominant market share in cloud computi
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

250 likes

2025 Cybersecurity Roadmap
If you want to break into Cybersecurity in 2025 these are the exact steps you need to follow. #cybersecurity #tech #cybersecuritymentor #cybersecuritytips
Quanahmichelle

Quanahmichelle

287 likes

Free Cybersecurity Courses from Microsoft
If you are interested in Cybersecurity, these FREE courses from Microsoft make learning easy and accessible for everyone 1. Cybersecurity Threat Vectors and Mitigation. In this course you are going to learn about: * Gain a comprehensive understanding of the constantly evolving world of cyber thr
Ivy League Help

Ivy League Help

245 likes

Remote Work Revolution: Top Websites Paying in USD
Stop Relying Solely on LinkedIn for Job Searches! It’s time to expand your horizons. While LinkedIn is a powerful tool, many people make the mistake of limiting their job search to just one platform. There are numerous other websites that can help you land high-paying remote jobs! Here are s
Laura ......

Laura ......

606 likes

Tech girl study time💻
I am a cybersecurity grad student and full time IT network administrator. I never realized I would become a tech girl until half way through my undergrad; I got my associates in biology. I graduated with my bachelors in computer science and worked as a student worker in the IT department at my scho
Shantae

Shantae

25 likes

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

547 likes

Top Cybersecurity Certifications to Get Hired in
Top Cybersecurity Certifications to Get Hired in 2025 Cybersecurity is one of the fastest-growing fields — companies everywhere are hiring professionals to protect their data. The right certification can skyrocket your chances of landing a high-paying role. Here are the most valuable cybersec
devswitchwithai

devswitchwithai

173 likes

How to break into cybersecurity
A great career that has been in high demand is cyber security. Especially with the rise of data privacy and data protection, cyber security careers have risen. If you are interested in pursuing this career, here are three steps to get started: Review Entry-level cybersecurity roles and what they e
Serena | Data

Serena | Data

7 likes

Tips for pursuing a career in cybersecurity
1. Build a Strong Technical Foundation A solid understanding of systems, networks, and programming is essential for identifying and mitigating security threats. • Learn networking basics (e.g., TCP/IP, firewalls, VPNs). • Gain familiarity with operating systems (Windows, Linux)
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

129 likes

Cybersecurity Roadmap
Link in the bio for resources #cybersecuritymentor #cybersecuritycertifications #cybersecurityroles #cybersecuritycourse #cybersecurity
Quanahmichelle

Quanahmichelle

23 likes

How to make LinkedIn work
#cybersecurity #techjobs #LinkedIn
Erika|Lifestyle🖤

Erika|Lifestyle🖤

17 likes

6 cybersecurity career paths to explore
Hello everyone! Cybersecurity offers varied career paths with specialized roles crucial for protecting digital assets. These roles are essential in cybersecurity, ensuring organizations are resilient against evolving digital threats.They involve proactive identification of vulnerabilities, swift in
Yun Jung

Yun Jung

102 likes

Future Cyber Threat Intelligence Analyst
#cybercrime #cybersecurity #cyber
DaijiaJana’

DaijiaJana’

17 likes

Cybersecurity checklist for corporate girlies
Hey All! 🌍 Staying safe online is more important than ever. Here are some key cybersecurity practices and tools to help protect your digital life. Let’s dive in! 👇 1. Strong Passwords 🔑 Use a Password Manager: Tools like LastPass or 1Password help create and store complex passwords. Unique Pas
Meghana

Meghana

18 likes

Top cybersecurity-related GitHub projects
My top GitHub list for cybersecurity projects is updated for this month 😎👆 Explore top-ranked FOSS projects spanning both the defensive and offensive sides of cybersecurity. Find a high-res pdf book with all my cybersecurity related infographics from https://study-notes.org #cybersecurity
Dan Nanni

Dan Nanni

27 likes

Break into Cybersecurity with this powerful Tool
Use this tool to create a stellar portfolio the cybersecurity hiring managers will love #cybersecuritytips #cybersecurity #cybersecuritystudent #tech #technology
JamesCybersecurity

JamesCybersecurity

24 likes

Useful netcat command examples
Netcat is the Swiss army knife of networking. It lets you read and write data over TCP or UDP, and infosec folks use it all the time for things like quick port scans, grabbing service banners, or setting up reverse shells. Here are useful netstat command examples 😎👆 Find high-res pdf ebooks w
Dan Nanni

Dan Nanni

2 likes

Cybersecurity
#fyp
JESSICA

JESSICA

36 likes

Cybersecurity projects for your resume
#cybersecurity #resumetips #techjobs #tech
JamesCybersecurity

JamesCybersecurity

16 likes

Top cybersecurity-related GitHub projects
GitHub is home to many open-source cybersecurity projects, providing security professionals with a rich toolkit for research, defense, and response Here are a list of the most popular #github repositories related to cybersecurity 😎👆 #infosec #informationsecurity #pentest Find a high-
Dan Nanni

Dan Nanni

29 likes

CYBERSECURITY SKILLS FOR YOUR RESUME
Until you have landed your first role, it’s crucial to gain hands on experience whether it’s from labs, projects, internships ect. Anything you can do to prove you can do the tasks required in the position will help you. Gotta do what ya gotta do #cybersecurity #cybersecuritytips #techresume
JayyDizzy | Cyber

JayyDizzy | Cyber

33 likes

CyberSecurity Major @ 35
35 and building a new future in cybersecurity. Proud of every step. 🌸 Stepping into the Tech World requires a lot of discipline and accountability!! As someone who finds it very difficult to focus, and who tends to procrastinate on long and tedious task….this is definitely a challenge. #Wome
TrapNSlayy

TrapNSlayy

17 likes

FOLLOW ME TO BREAK IN TO CYBERSECURITY
Security+ in 30 days. If I can do it, I promise you can too. If you’re interested in Cybersecurity or already in the field, follow me! #cybersecurity #cybersafe #comptia #securityplus
JayyDizzy | Cyber

JayyDizzy | Cyber

11 likes

Cybersecurity
Who else is studying for the comptia test?
CandaceMichelle

CandaceMichelle

17 likes

Specialized Roles in Tech: Cybersecurity & UX
Hello everyone! I wanted to share insights into two specialized tech roles: UX Design and cybersecurity. UX Design enhances user satisfaction by creating intuitive interfaces through research, prototyping, and testing. Meanwhile, cybersecurity professionals protect digital assets with security meas
Yun Jung

Yun Jung

33 likes

Tech and Cybersecurity Truths
#cybersecurity #cybersecurityjobs #technology #tech #techgirlie
Quanahmichelle

Quanahmichelle

42 likes

20 Free Tools For CyberSecurity Enthusiasts
#Tech #hacking #hacker #cybersecurity #pentesting #startup #hacker #cyber #command #Prompt
ⵜⵉⴽ-TIK

ⵜⵉⴽ-TIK

81 likes

Certified and Ready for My Cybersecurity Degree!
On My Way to Becoming a Cybersecurity Pro! 🎓🔐 Just Earned My Info Assurance & Security Cert, Now Tackling My BSc in Cyber Security! #UniversityOfPhoenix #TechJourney #RobinHood
BinaryRecovery

BinaryRecovery

15 likes

Day in a life of a Cybersecurity Analyst
#lemon #Lemon8Diary #cybersecurty
Cyber_dani

Cyber_dani

19 likes

#cybersecurity #studying #studytok #studywithme #BackToSchool
study with me 📚

study with me 📚

22 likes

Trending tech jobs right now 2024 👩‍💻💰
1. Data Scientist - What to study: Data Science, Statistics, Mathematics, or Computer Science. Learn programming languages like Python and R, along with machine learning techniques and data visualization tools. - How to become: Get a degree in a relevant field, and consider earning certific
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

27 likes

🌈 Which “collar” fits your vibe? Drop it in the comments! 👇. BlueCollar #WhiteCollar #PinkCollar #GreenCollar
Phayimih

Phayimih

37 likes

#cybersecurity
Cyber Secrets

Cyber Secrets

250 likes

Study tips
"Hack Your Study Routine!" Break your study time into "coding sprints." 25 minutes of focus, followed by a 5-minute break to refresh your brain! Use the Pomodoro technique to keep those lines of code flowing smoothly. "Stay Cyber Secure!" Always lock your study session wi
Dannieeeg

Dannieeeg

4 likes

Not every high-paying tech role requires a tech degree and honestly some of the best ones don’t. Your degree doesn’t have to say “computer science” for you to win here. I’ve either worked in or worked closely with these roles, so if you want me to break down how to get into one step by step, commen
Faïkat M.

Faïkat M.

11 likes

This could help you in the long run in cyber
#unfiltered #lemon8challenge As someone who has been in tech for now 5 year and just recently started into cybersecurity 💻 here are some like codes and hack that can help you in school and to also break into tech like myself‼️ #cybersecurity #womenintech #blackwomenintech #Lemon8 #l
Affinity B

Affinity B

232 likes

✨ Go Back to College for FREE! ✨ New York State’s SUNY & CUNY Reconnect Programs are giving adults ages 25–55 a chance to earn a degree tuition-free! 🎓 ✅ Covers tuition, fees, books & supplies (after other aid) ✅ Available at all SUNY & CUNY community colleges ✅ Focused on high-demand fields
Abigail E.

Abigail E.

5 likes

See more