Tags
Language
Tags
September 2025
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cryptography and Squid Proxy Server

    Posted By: ELK1nG
    Cryptography and Squid Proxy Server

    Cryptography and Squid Proxy Server
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
    Genre: eLearning | Language: English + srt | Duration: 5 lectures (12h 50m) | Size: 4.28 GB

    Learn how cryptography works with real time lab devices

    What you'll learn:
    Understanding Confidentiality, Integrity and Authenticity
    How encryption and decryption works with Practical Labs
    Symmetric and Asymmetric encryption with Practical Labs
    RSA key exchange with Practical Labs
    Diffie Hellman key exchange with Practical Labs
    Digital Signature with Practical Labs
    What is Certificate Authority and Making Linux machine a CA.
    How encryption works on HTTPS site works with DH and CA
    Squid Proxy Server with Practical Labs
    Installing and Configuring Squid Proxy Server - Explicit Proxy
    HTTPS Inspection or SSL Interception with Practical Labs
    Practicing URL filtering, File Blocking on Proxy Server

    Requirements
    Basic Networking Understanding

    Description
    Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix "crypt-" means "hidden" or "vault" – and the suffix "-graphy" stands for "writing."

    In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet, and confidential communications such as credit card transactions and emai.

    Concepts you will learn here.

    Understanding Confidentiality, Integrity and Authenticity

    How encryption and decryption works

    Symmetric and Asymmetric encryption

    RSA key exchange

    Diffie Hellman key exchange

    Digital Signature

    What is Certificate Authority and Making Linux machine a CA.

    How encryption works on HTTPS site works with DH and CA

    Squid Proxy Server

    HTTPS Inspection or SSL Interception

    Practicing URL filtering, File Blocking on Proxy Server

    How encryption and decryption works with Practical Labs

    Symmetric and Asymmetric encryption with Practical Labs

    RSA key exchange with Practical Labs

    Diffie Hellman key exchange with Practical Labs

    Digital Signature with Practical Labs

    Squid Proxy Server with Practical Labs

    Installing and Configuring Squid Proxy Server - Explicit Proxy

    HTTPS Inspection or SSL Interception with Practical Labs

    Practicing URL filtering, File Blocking on Proxy Server

    Who this course is for
    Network Engineers