Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Cryptography

Posted By: ELK1nG
Cryptography

Cryptography
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.53 GB | Duration: 2h 25m

Cipher Modes, PKI, Tunnel, Transport

What you'll learn

Understand Cryptography principles

PKI knowledge

Understanding Tunnel vs Transport

Understanding Cipher modes

Requirements

None

Description

This course on cryptography delves into the fundamental concepts of IT security, emphasizing the historical evolution of ciphers and modern cryptographic practices. It explores the origins and mechanics of classical encryption methods, such as the Caesar cipher, BIFID cipher, Playfair cipher, and Vigenère cipher, providing learners with foundational knowledge of symmetric encryption techniques. Understanding the importance of the CIA triad—Confidentiality, Integrity, and Availability—will be a core theme, underscoring security goals in cryptographic practices.Learners will study Public Key Infrastructure (PKI) and digital certificates, essential components of modern security, enabling secure communication and authentication. The course also covers tunneling and encapsulation protocols like Transport, Authentication Header (AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE), each providing critical insights into secure data transmission over networks.Moreover, the course introduces the concepts of cryptanalysis and crypto-cracking, giving students a glimpse into methods for decrypting information and examining the robustness of encryption. These practical insights allow learners to critically evaluate and understand encryption’s role in digital security, preparing them for advanced cryptographic concepts and applications in cybersecurity.The course equips students with practical skills in securing data and understanding vulnerabilities, laying a strong foundation for further exploration in cybersecurity fields, including encryption standards and advanced cryptographic applications.

Overview

Section 1: Introduction

Lecture 1 Bifid Cipher, Playfaire, Homophonic Cipher

Lecture 2 Ceasar Coding, Scrambled Alphabet, Vigenere Cipher

Lecture 3 Morse Code, Fractionated Morse Code, Pig Pen, Rail Code

Lecture 4 Combinations, Permutations, Set-Theory

Lecture 5 One Time Pad, Data, Hexadecimal

Lecture 6 Data Integrity, Reed Solomon

Lecture 7 Huffman Coding, Lemep Viz Welsh

Lecture 8 Little Endian, Big Endian

Lecture 9 Integers, Rationale Numbers, Real Numbers, Prime Numbers

Lecture 10 Binary Math XOR, OR, And

Lecture 11 Cryptography, Cryptanalysis, Cryptology, Cleartext, Ciphertext

Lecture 12 Mod, Shift-Operators, Pseudo Random, True Random

Lecture 13 MonoAlphabetic, Polyalphabetic

Lecture 14 Enigma Machine, Asymmetric Encryption, Symmetric Encryption

Lecture 15 Frequency analysis

Section 2: CH2

Lecture 16 Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman

Lecture 17 ECB, CBC, CFB, OFB, CTR

Lecture 18 PGP, Stream, Block Encryption

Lecture 19 IV, Substitution, Transformation, Diffusion

Lecture 20 Padding, DES, 3DES

Lecture 21 Entropy, Encryption, Decryption, Encoding

Lecture 22 AES, IDEA, RC2, RC5, RC6

Lecture 23 Skipjack, BlowFish, TwoFish, Camilla, XTEA

Section 3: Ch3-12

Lecture 24 Hashing

Lecture 25 Hash collision, Preimage Attack, Birthday Attack

Lecture 26 Salt, Bcrypt

Lecture 27 Rainbow Table, HMAC, APR1

Lecture 28 LDAP, PHPass, Cisco Hashes

Lecture 29 PBKDF2, noncryptographic hash, Password Strength, Cloud Cracking

Lecture 30 CBC-MAC CCM, Windows hashing, Linux hashing

Lecture 31 CIA Triad and PKI

Lecture 32 PKCS#5, #7, #10, #12, CA Hierarchy

Lecture 33 One, Two Way Authentication, EndtoEnd and Intermediate Authentication, Types of

Lecture 34 Cert types ,Digital Certificate stages, states of revocation

Lecture 35 Tunnel, Transport, AH, ESP

Lecture 36 IPSEC Phases

Lecture 37 IKE, TOR

Lecture 38 key escrow, anobus, AES weakness

Lecture 39 Cryptocracking

Lecture 40 Light-weight cryptography

Lecture 41 Bitcoin, Ethereum

Lecture 42 WEP, WEP+TKIP

Lecture 43 RC4, WPA, WPA2, Wireless protocols

Lecture 44 ChaCha20, A5 cipher

Section 4: Assessment Review

Lecture 45 Questions 1-10

Lecture 46 Questions 11-20

Lecture 47 Questions 21-30

Lecture 48 Questions 31-40

Lecture 49 Questions 41-50

Lecture 50 Questions 51-60

Technology Learners