Learning_Cryptography_and_Network_Security
- 收录时间:2020-06-22 07:18:44
- 文件大小:458MB
- 下载次数:6
- 最近下载:2020-10-27 11:27:22
- 磁力链接:
-
文件列表
- 3_2._Symmetric_Encryption/12_Introducing_symmetric_encryption.mp4 74MB
- 4_3._Asymmetric_Encryption_and_Digital_Signatures/17_Overview_and_cryptographic_requirements.mp4 60MB
- 5_4._Hash_Algorithms_Message_Digests_and_Authentication/24_Understanding_passwords_hash_salt_and_rainbow_tables.mp4 33MB
- 1_Introduction/01_Welcome.mp4 24MB
- 2_1._Network_Security/07_Comparing_passive_and_active_network_attacks.mp4 18MB
- 6_5._Secure_Sockets_Layer_SSL/28_Exploring_the_security_of_SSL_with_Wireshark.mp4 17MB
- 3_2._Symmetric_Encryption/16_Using_Wireshark_to_crack_WEP.mp4 15MB
- 2_1._Network_Security/09_Reviewing_the_history_of_cryptography.mp4 13MB
- 6_5._Secure_Sockets_Layer_SSL/27_Introducing_Secure_Sockets_Layer_SSL.mp4 13MB
- 5_4._Hash_Algorithms_Message_Digests_and_Authentication/22_Diving_into_hash_algorithms_and_message_digests.mp4 12MB
- 2_1._Network_Security/08_Introducing_common_cryptographic_concepts_and_terminology.mp4 12MB
- 8_7._Internet_Protocol_Security/31_Exploring_Internet_Protocol_Security_IPsec.mp4 11MB
- 3_2._Symmetric_Encryption/15_Dissecting_block_and_stream_ciphers.mp4 11MB
- 3_2._Symmetric_Encryption/14_Working_with_the_Advanced_Encryption_Standard_AES.mp4 11MB
- 3_2._Symmetric_Encryption/13_Making_sense_of_the_Feistel_cipher.mp4 10MB
- 5_4._Hash_Algorithms_Message_Digests_and_Authentication/26_Solution_-_Password_strength_tests.mp4 10MB
- 8_7._Internet_Protocol_Security/32_Dissecting_the_authentication_header.mp4 10MB
- 5_4._Hash_Algorithms_Message_Digests_and_Authentication/23_Looking_deeper_into_message_digests.mp4 9MB
- 4_3._Asymmetric_Encryption_and_Digital_Signatures/20_Managing_keys.mp4 9MB
- 4_3._Asymmetric_Encryption_and_Digital_Signatures/18_Dissecting_the_public_key_algorithms_-_RSA_and_Diffie-Hellman.mp4 9MB
- 4_3._Asymmetric_Encryption_and_Digital_Signatures/21_Using_certificates.mp4 9MB
- 7_6._Email_Security/30_Implementing_PGP_email_security_with_GPG.mp4 8MB
- 2_1._Network_Security/06_Providing_confidentiality_integrity_authentication_and_non-repudiation.mp4 8MB
- 8_7._Internet_Protocol_Security/34_Using_operating_mechanisms.mp4 8MB
- 2_1._Network_Security/05_Understanding_why_encryption_is_necessary.mp4 8MB
- 7_6._Email_Security/29_Investigating_email_privacy_and_authentication_concerns.mp4 7MB
- 8_7._Internet_Protocol_Security/33_Encapsulating_security_payloads.mp4 6MB
- 4_3._Asymmetric_Encryption_and_Digital_Signatures/19_Creating_key_pairs_for_the_Diffie-Hellman_algorithm.mp4 6MB
- 2_1._Network_Security/10_Challenge_-_Coding_with_the_Enigma_machine.mp4 4MB
- 1_Introduction/04_Challenges_explained.mp4 3MB
- 9_Conclusion/35_Next_steps.mp4 3MB
- 5_4._Hash_Algorithms_Message_Digests_and_Authentication/25_Challenge_-_Password_strength_tests.mp4 2MB
- 1_Introduction/02_What_you_should_know_before_watching_this_course.mp4 2MB
- 2_1._Network_Security/11_Solution_-_Coding_with_the_Enigma_machine.mp4 1MB
- 1_Introduction/03_Using_the_exercise_files.mp4 482KB