riversongs Posted November 23, 2024 Report Share Posted November 23, 2024 Free Download Udemy - Cryptography by Paris WolfPublished 11/2024MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHzLanguage: English | Size: 2.53 GB | Duration: 2h 25mCipher Modes, PKI, Tunnel, TransportWhat you'll learnUnderstand Cryptography principlesPKI knowledgeUnderstanding Tunnel vs TransportUnderstanding Cipher modesRequirementsNoneDescriptionThis course on cryptography delves into the fundamental concepts of IT security, emphasizing the historical evolution of ciphers and modern cryptographic practices. It explores the origins and mechanics of classical encryption methods, such as the Caesar cipher, BIFID cipher, Playfair cipher, and Vigenère cipher, providing learners with foundational knowledge of symmetric encryption techniques. Understanding the importance of the CIA triad-Confidentiality, Integrity, and Availability-will be a core theme, underscoring security goals in cryptographic practices.Learners will study Public Key Infrastructure (PKI) and digital certificates, essential components of modern security, enabling secure communication and authentication. The course also covers tunneling and encapsulation protocols like Transport, Authentication Header (AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE), each providing critical insights into secure data transmission over networks.Moreover, the course introduces the concepts of cryptanalysis and crypto-cracking, giving students a glimpse into methods for decrypting information and examining the robustness of encryption. These practical insights allow learners to critically evaluate and understand encryption's role in digital security, preparing them for advanced cryptographic concepts and applications in cybersecurity.The course equips students with practical skills in securing data and understanding vulnerabilities, laying a strong foundation for further exploration in cybersecurity fields, including encryption standards and advanced cryptographic applications.OverviewSection 1: IntroductionLecture 1 Bifid Cipher, Playfaire, Homophonic CipherLecture 2 Ceasar Coding, Scrambled Alphabet, Vigenere CipherLecture 3 Morse Code, Fractionated Morse Code, Pig Pen, Rail CodeLecture 4 Combinations, Permutations, Set-TheoryLecture 5 One Time Pad, Data, HexadecimalLecture 6 Data Integrity, Reed SolomonLecture 7 Huffman Coding, Lemep Viz WelshLecture 8 Little Endian, Big EndianLecture 9 Integers, Rationale Numbers, Real Numbers, Prime NumbersLecture 10 Binary Math XOR, OR, AndLecture 11 Cryptography, Cryptanalysis, Cryptology, Cleartext, CiphertextLecture 12 Mod, Shift-Operators, Pseudo Random, True RandomLecture 13 MonoAlphabetic, PolyalphabeticLecture 14 Enigma Machine, Asymmetric Encryption, Symmetric EncryptionLecture 15 Frequency analysisSection 2: CH2Lecture 16 Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-HellmanLecture 17 ECB, CBC, CFB, OFB, CTRLecture 18 PGP, Stream, Block EncryptionLecture 19 IV, Substitution, Transformation, DiffusionLecture 20 Padding, DES, 3DESLecture 21 Entropy, Encryption, Decryption, EncodingLecture 22 AES, IDEA, RC2, RC5, RC6Lecture 23 Skipjack, BlowFish, TwoFish, Camilla, XTEASection 3: Ch3-12Lecture 24 HashingLecture 25 Hash collision, Preimage Attack, Birthday AttackLecture 26 Salt, BcryptLecture 27 Rainbow Table, HMAC, APR1Lecture 28 LDAP, PHPass, Cisco HashesLecture 29 PBKDF2, noncryptographic hash, Password Strength, Cloud CrackingLecture 30 CBC-MAC CCM, Windows hashing, Linux hashingLecture 31 CIA Triad and PKILecture 32 PKCS#5, #7, #10, #12, CA HierarchyLecture 33 One, Two Way Authentication, EndtoEnd and Intermediate Authentication, Types ofLecture 34 Cert types ,Digital Certificate stages, states of revocationLecture 35 Tunnel, Transport, AH, ESPLecture 36 IPSEC PhasesLecture 37 IKE, TORLecture 38 key escrow, anobus, AES weaknessLecture 39 CryptocrackingLecture 40 Light-weight cryptographyLecture 41 Bitcoin, EthereumLecture 42 WEP, WEP+TKIPLecture 43 RC4, WPA, WPA2, Wireless protocolsLecture 44 ChaCha20, A5 cipherSection 4: Assessment ReviewLecture 45 Questions 1-10Lecture 46 Questions 11-20Lecture 47 Questions 21-30Lecture 48 Questions 31-40Lecture 49 Questions 41-50Lecture 50 Questions 51-60Technology LearnersHomepagehttps://www.udemy.com/course/cryptography101/Download ( Rapidgator )https://rg.to/file/4a727717839e38c07ecc09a36ea1baeb/felen.Cryptography.by.Paris.Wolf.part1.rar.htmlhttps://rg.to/file/c22d323795115b19a624a307c63aa4ed/felen.Cryptography.by.Paris.Wolf.part3.rar.htmlhttps://rg.to/file/e3d9a90b99dce6ff0365fc37d590de15/felen.Cryptography.by.Paris.Wolf.part2.rar.htmlFikperhttps://fikper.com/6tm4SFhEF7/felen.Cryptography.by.Paris.Wolf.part2.rar.htmlhttps://fikper.com/HydDw2dlKh/felen.Cryptography.by.Paris.Wolf.part1.rar.htmlhttps://fikper.com/WbExUYEuew/felen.Cryptography.by.Paris.Wolf.part3.rar.htmlNo Password - Links are Interchangeable Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now