Download link
File List
-
1_Introduction/01_Welcome.mp4 24.24 MB
1_Introduction/02_What_you_should_know_before_watching_this_course.mp4 1.73 MB
1_Introduction/03_Using_the_exercise_files.mp4 482.19 KB
1_Introduction/04_Challenges_explained.mp4 3.16 MB
2_1._Network_Security/05_Understanding_why_encryption_is_necessary.mp4 7.99 MB
2_1._Network_Security/06_Providing_confidentiality_integrity_authentication_and_non-repudiation.mp4 8.36 MB
2_1._Network_Security/07_Comparing_passive_and_active_network_attacks.mp4 18.33 MB
2_1._Network_Security/08_Introducing_common_cryptographic_concepts_and_terminology.mp4 11.61 MB
2_1._Network_Security/09_Reviewing_the_history_of_cryptography.mp4 12.92 MB
2_1._Network_Security/10_Challenge_-_Coding_with_the_Enigma_machine.mp4 3.78 MB
2_1._Network_Security/11_Solution_-_Coding_with_the_Enigma_machine.mp4 1.32 MB
3_2._Symmetric_Encryption/12_Introducing_symmetric_encryption.mp4 74.12 MB
3_2._Symmetric_Encryption/13_Making_sense_of_the_Feistel_cipher.mp4 10.44 MB
3_2._Symmetric_Encryption/14_Working_with_the_Advanced_Encryption_Standard_AES.mp4 11.1 MB
3_2._Symmetric_Encryption/15_Dissecting_block_and_stream_ciphers.mp4 11.12 MB
3_2._Symmetric_Encryption/16_Using_Wireshark_to_crack_WEP.mp4 14.86 MB
4_3._Asymmetric_Encryption_and_Digital_Signatures/17_Overview_and_cryptographic_requirements.mp4 59.75 MB
4_3._Asymmetric_Encryption_and_Digital_Signatures/18_Dissecting_the_public_key_algorithms_-_RSA_and_Diffie-Hellman.mp4 9.15 MB
4_3._Asymmetric_Encryption_and_Digital_Signatures/19_Creating_key_pairs_for_the_Diffie-Hellman_algorithm.mp4 6.02 MB
4_3._Asymmetric_Encryption_and_Digital_Signatures/20_Managing_keys.mp4 9.34 MB
4_3._Asymmetric_Encryption_and_Digital_Signatures/21_Using_certificates.mp4 8.67 MB
5_4._Hash_Algorithms_Message_Digests_and_Authentication/22_Diving_into_hash_algorithms_and_message_digests.mp4 12.06 MB
5_4._Hash_Algorithms_Message_Digests_and_Authentication/23_Looking_deeper_into_message_digests.mp4 9.34 MB
5_4._Hash_Algorithms_Message_Digests_and_Authentication/24_Understanding_passwords_hash_salt_and_rainbow_tables.mp4 32.67 MB
5_4._Hash_Algorithms_Message_Digests_and_Authentication/25_Challenge_-_Password_strength_tests.mp4 1.79 MB
5_4._Hash_Algorithms_Message_Digests_and_Authentication/26_Solution_-_Password_strength_tests.mp4 9.95 MB
6_5._Secure_Sockets_Layer_SSL/27_Introducing_Secure_Sockets_Layer_SSL.mp4 12.57 MB
6_5._Secure_Sockets_Layer_SSL/28_Exploring_the_security_of_SSL_with_Wireshark.mp4 17.19 MB
7_6._Email_Security/29_Investigating_email_privacy_and_authentication_concerns.mp4 6.75 MB
7_6._Email_Security/30_Implementing_PGP_email_security_with_GPG.mp4 8.48 MB
8_7._Internet_Protocol_Security/31_Exploring_Internet_Protocol_Security_IPsec.mp4 11.19 MB
8_7._Internet_Protocol_Security/32_Dissecting_the_authentication_header.mp4 9.82 MB
8_7._Internet_Protocol_Security/33_Encapsulating_security_payloads.mp4 6.11 MB
8_7._Internet_Protocol_Security/34_Using_operating_mechanisms.mp4 8.04 MB
9_Conclusion/35_Next_steps.mp4 3.16 MB
Download Info
-
Tips
“Learning_Cryptography_and_Network_Security” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.