589689.xyz

Learning_Cryptography_and_Network_Security

  • 收录时间:2020-06-22 07:18:44
  • 文件大小:458MB
  • 下载次数:6
  • 最近下载:2020-10-27 11:27:22
  • 磁力链接:

文件列表

  1. 3_2._Symmetric_Encryption/12_Introducing_symmetric_encryption.mp4 74MB
  2. 4_3._Asymmetric_Encryption_and_Digital_Signatures/17_Overview_and_cryptographic_requirements.mp4 60MB
  3. 5_4._Hash_Algorithms_Message_Digests_and_Authentication/24_Understanding_passwords_hash_salt_and_rainbow_tables.mp4 33MB
  4. 1_Introduction/01_Welcome.mp4 24MB
  5. 2_1._Network_Security/07_Comparing_passive_and_active_network_attacks.mp4 18MB
  6. 6_5._Secure_Sockets_Layer_SSL/28_Exploring_the_security_of_SSL_with_Wireshark.mp4 17MB
  7. 3_2._Symmetric_Encryption/16_Using_Wireshark_to_crack_WEP.mp4 15MB
  8. 2_1._Network_Security/09_Reviewing_the_history_of_cryptography.mp4 13MB
  9. 6_5._Secure_Sockets_Layer_SSL/27_Introducing_Secure_Sockets_Layer_SSL.mp4 13MB
  10. 5_4._Hash_Algorithms_Message_Digests_and_Authentication/22_Diving_into_hash_algorithms_and_message_digests.mp4 12MB
  11. 2_1._Network_Security/08_Introducing_common_cryptographic_concepts_and_terminology.mp4 12MB
  12. 8_7._Internet_Protocol_Security/31_Exploring_Internet_Protocol_Security_IPsec.mp4 11MB
  13. 3_2._Symmetric_Encryption/15_Dissecting_block_and_stream_ciphers.mp4 11MB
  14. 3_2._Symmetric_Encryption/14_Working_with_the_Advanced_Encryption_Standard_AES.mp4 11MB
  15. 3_2._Symmetric_Encryption/13_Making_sense_of_the_Feistel_cipher.mp4 10MB
  16. 5_4._Hash_Algorithms_Message_Digests_and_Authentication/26_Solution_-_Password_strength_tests.mp4 10MB
  17. 8_7._Internet_Protocol_Security/32_Dissecting_the_authentication_header.mp4 10MB
  18. 5_4._Hash_Algorithms_Message_Digests_and_Authentication/23_Looking_deeper_into_message_digests.mp4 9MB
  19. 4_3._Asymmetric_Encryption_and_Digital_Signatures/20_Managing_keys.mp4 9MB
  20. 4_3._Asymmetric_Encryption_and_Digital_Signatures/18_Dissecting_the_public_key_algorithms_-_RSA_and_Diffie-Hellman.mp4 9MB
  21. 4_3._Asymmetric_Encryption_and_Digital_Signatures/21_Using_certificates.mp4 9MB
  22. 7_6._Email_Security/30_Implementing_PGP_email_security_with_GPG.mp4 8MB
  23. 2_1._Network_Security/06_Providing_confidentiality_integrity_authentication_and_non-repudiation.mp4 8MB
  24. 8_7._Internet_Protocol_Security/34_Using_operating_mechanisms.mp4 8MB
  25. 2_1._Network_Security/05_Understanding_why_encryption_is_necessary.mp4 8MB
  26. 7_6._Email_Security/29_Investigating_email_privacy_and_authentication_concerns.mp4 7MB
  27. 8_7._Internet_Protocol_Security/33_Encapsulating_security_payloads.mp4 6MB
  28. 4_3._Asymmetric_Encryption_and_Digital_Signatures/19_Creating_key_pairs_for_the_Diffie-Hellman_algorithm.mp4 6MB
  29. 2_1._Network_Security/10_Challenge_-_Coding_with_the_Enigma_machine.mp4 4MB
  30. 1_Introduction/04_Challenges_explained.mp4 3MB
  31. 9_Conclusion/35_Next_steps.mp4 3MB
  32. 5_4._Hash_Algorithms_Message_Digests_and_Authentication/25_Challenge_-_Password_strength_tests.mp4 2MB
  33. 1_Introduction/02_What_you_should_know_before_watching_this_course.mp4 2MB
  34. 2_1._Network_Security/11_Solution_-_Coding_with_the_Enigma_machine.mp4 1MB
  35. 1_Introduction/03_Using_the_exercise_files.mp4 482KB