Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Udemy - Cryptography by Paris Wolf
#1
Video 
[Image: b89dd8ec30644db34d993175fe1fb967.jpeg]
Free Download Udemy - Cryptography by Paris Wolf
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.53 GB | Duration: 2h 25m
Cipher Modes, PKI, Tunnel, Transport

What you'll learn
Understand Cryptography principles
PKI knowledge
Understanding Tunnel vs Transport
Understanding Cipher modes
Requirements
None
Description
This course on cryptography delves into the fundamental concepts of IT security, emphasizing the historical evolution of ciphers and modern cryptographic practices. It explores the origins and mechanics of classical encryption methods, such as the Caesar cipher, BIFID cipher, Playfair cipher, and Vigenère cipher, providing learners with foundational knowledge of symmetric encryption techniques. Understanding the importance of the CIA triad-Confidentiality, Integrity, and Availability-will be a core theme, underscoring security goals in cryptographic practices.Learners will study Public Key Infrastructure (PKI) and digital certificates, essential components of modern security, enabling secure communication and authentication. The course also covers tunneling and encapsulation protocols like Transport, Authentication Header (AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE), each providing critical insights into secure data transmission over networks.Moreover, the course introduces the concepts of cryptanalysis and crypto-cracking, giving students a glimpse into methods for decrypting information and examining the robustness of encryption. These practical insights allow learners to critically evaluate and understand encryption's role in digital security, preparing them for advanced cryptographic concepts and applications in cybersecurity.The course equips students with practical skills in securing data and understanding vulnerabilities, laying a strong foundation for further exploration in cybersecurity fields, including encryption standards and advanced cryptographic applications.
Overview
Section 1: Introduction
Lecture 1 Bifid Cipher, Playfaire, Homophonic Cipher
Lecture 2 Ceasar Coding, Scrambled Alphabet, Vigenere Cipher
Lecture 3 Morse Code, Fractionated Morse Code, Pig Pen, Rail Code
Lecture 4 Combinations, Permutations, Set-Theory
Lecture 5 One Time Pad, Data, Hexadecimal
Lecture 6 Data Integrity, Reed Solomon
Lecture 7 Huffman Coding, Lemep Viz Welsh
Lecture 8 Little Endian, Big Endian
Lecture 9 Integers, Rationale Numbers, Real Numbers, Prime Numbers
Lecture 10 Binary Math XOR, OR, And
Lecture 11 Cryptography, Cryptanalysis, Cryptology, Cleartext, Ciphertext
Lecture 12 Mod, Shift-Operators, Pseudo Random, True Random
Lecture 13 MonoAlphabetic, Polyalphabetic
Lecture 14 Enigma Machine, Asymmetric Encryption, Symmetric Encryption
Lecture 15 Frequency analysis
Section 2: CH2
Lecture 16 Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman
Lecture 17 ECB, CBC, CFB, OFB, CTR
Lecture 18 PGP, Stream, Block Encryption
Lecture 19 IV, Substitution, Transformation, Diffusion
Lecture 20 Padding, DES, 3DES
Lecture 21 Entropy, Encryption, Decryption, Encoding
Lecture 22 AES, IDEA, RC2, RC5, RC6
Lecture 23 Skipjack, BlowFish, TwoFish, Camilla, XTEA
Section 3: Ch3-12
Lecture 24 Hashing
Lecture 25 Hash collision, Preimage Attack, Birthday Attack
Lecture 26 Salt, Bcrypt
Lecture 27 Rainbow Table, HMAC, APR1
Lecture 28 LDAP, PHPass, Cisco Hashes
Lecture 29 PBKDF2, noncryptographic hash, Password Strength, Cloud Cracking
Lecture 30 CBC-MAC CCM, Windows hashing, Linux hashing
Lecture 31 CIA Triad and PKI
Lecture 32 PKCS#5, #7, #10, #12, CA Hierarchy
Lecture 33 One, Two Way Authentication, EndtoEnd and Intermediate Authentication, Types of
Lecture 34 Cert types ,Digital Certificate stages, states of revocation
Lecture 35 Tunnel, Transport, AH, ESP
Lecture 36 IPSEC Phases
Lecture 37 IKE, TOR
Lecture 38 key escrow, anobus, AES weakness
Lecture 39 Cryptocracking
Lecture 40 Light-weight cryptography
Lecture 41 Bitcoin, Ethereum
Lecture 42 WEP, WEP+TKIP
Lecture 43 RC4, WPA, WPA2, Wireless protocols
Lecture 44 ChaCha20, A5 cipher
Section 4: Assessment Review
Lecture 45 Questions 1-10
Lecture 46 Questions 11-20
Lecture 47 Questions 21-30
Lecture 48 Questions 31-40
Lecture 49 Questions 41-50
Lecture 50 Questions 51-60
Technology Learners
Homepage

[To see links please register or login]


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live

[To see links please register or login]

No Password - Links are Interchangeable
[Image: signature.png]
Reply


Download Now



Forum Jump:


Users browsing this thread:

Download Now