- Downloaded
- 135.2 GB
- Uploaded
- 13.1 TB
- Ratio
- 99.18
- Seedbonus
- 273,226
- Upload Count
- 265 (300)
Member for 9 years
Cryptography in Cyber Security
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 22 lectures (2 hour, 9 mins) | Size: 1.93 GB
Learn Cryptography in Modern Applications,
Improve Your Information Security Skills.
What you'll learn
Cryptography.
Cyber security.
Confidentiality.
Quantum Computing.
Crypto in Python.
Requirements
Basic math.
General computing.
Who this course is for:
Developers.
Cyber Security Personnel.
DevSecOps.
Security Administrators.
System Administrators.
Download
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 22 lectures (2 hour, 9 mins) | Size: 1.93 GB
Learn Cryptography in Modern Applications,
Improve Your Information Security Skills.
What you'll learn
Cryptography.
Cyber security.
Confidentiality.
Quantum Computing.
Crypto in Python.
Requirements
Basic math.
General computing.
You can find basics of cryptography and learn Cryptographic Toolset.
Symmetric and asymmetric algorithms,;
AES,
RSA,
DH,
ECDH,
ECDSA
Hash Functions:
SHA-1,
SHA-2,
SHA-3
MD5
Message Authentication Codes (MAC, HMAC)
You can find answers to the questions?
Which one to use Block Cipher or Stream Cipher? When and Where?
Which Block Cipher to use? Alternatives.
Which Mode of Operation to use?
What is LFSR?
Why we need MAC functions?
Main focus will be cyber security means that you will not be drown in advanced math, our aim is not to be a cryptographer. That is more tied with math subjects like abstract algebra, number theory, finite fields and so on. You will get key principals of cryptography.
Implement security systems efficiently,
Enhance the reliability of the systems you are administering,
Improve your cyber security skills.
Symmetric and asymmetric algorithms,;
AES,
RSA,
DH,
ECDH,
ECDSA
Hash Functions:
SHA-1,
SHA-2,
SHA-3
MD5
Message Authentication Codes (MAC, HMAC)
You can find answers to the questions?
Which one to use Block Cipher or Stream Cipher? When and Where?
Which Block Cipher to use? Alternatives.
Which Mode of Operation to use?
What is LFSR?
Why we need MAC functions?
Main focus will be cyber security means that you will not be drown in advanced math, our aim is not to be a cryptographer. That is more tied with math subjects like abstract algebra, number theory, finite fields and so on. You will get key principals of cryptography.
Implement security systems efficiently,
Enhance the reliability of the systems you are administering,
Improve your cyber security skills.
Who this course is for:
Developers.
Cyber Security Personnel.
DevSecOps.
Security Administrators.
System Administrators.
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links
Download
You must be registered for see links
You must be registered for see links
You must be registered for see links
You must be registered for see links