# 3. Perform Disk Encryption

## 1. Disk Encryption using Veracrypt

VeraCrypt is a software used for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted just before it is saved, and decrypted just after it is loaded, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. The entire file system is encrypted (e.g., file names, folder names, free space, metadata, etc.).

Create a new encrypted volume

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FWyK00cfHtBlRaIr0uULv%2Fimage.png?alt=media&#x26;token=5ea10c51-26f0-48b4-9bc1-6c96d780a8fd" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FYgOYHl3YE9JQmKRL3bUN%2Fimage.png?alt=media&#x26;token=70814607-b8d3-4fdb-b51a-6810c90e7111" alt=""><figcaption></figcaption></figure>

Check the random box

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2F58ooQirqwU3G6IMnTRll%2Fimage.png?alt=media&#x26;token=b69ae655-2951-4c16-9e84-a132977ace89" alt=""><figcaption></figcaption></figure>

To use mount it

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FeyFJV5tPoMDY2R1qYqxN%2Fimage.png?alt=media&#x26;token=8d551efb-a826-4255-9555-da3ac46f5c5c" alt=""><figcaption></figcaption></figure>

## <mark style="color:red;">2. Disk Encryption using Bitlocker</mark>

Turn BitLocker on for completer disk encryption

## <mark style="color:red;">3. Disk Encryption using Rohos</mark>

{% embed url="<https://rohos.com/products/rohos-disk-encryption/>" %}

Create a new encrypted disk

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FVE5zTfMqaJORJTqfor7N%2Fimage.png?alt=media&#x26;token=9d2e0440-d278-4a94-b0c8-27e6e5047133" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2Ff1sdMXuKzlswC8EPaKMe%2Fimage.png?alt=media&#x26;token=8e63a0d5-7a95-45f2-b237-26b36fcfc3d3" alt=""><figcaption></figcaption></figure>

{% embed url="<https://www.udemy.com/course/ethical-hacker-practical/?referralCode=289CF01CF51246BCAD6C>" %}
