Lynda - Learning Cryptography and Network Security
- 收录时间:2018-03-08 19:29:59
- 文件大小:457MB
- 下载次数:436
- 最近下载:2021-01-17 15:55:29
- 磁力链接:
-
文件列表
- 02. Symmetric Encryption/02_01 - Introducing symmetric encryption.mp4 74MB
- 03. Asymmetric Encryption and Digital Signatures/03_01 - Overview and cryptographic requirements.mp4 60MB
- 04. Hash Algorithms, Message Digests, and Authentication/04_03 - Understanding passwords, hash, salt, and rainbow tables.mp4 33MB
- 00. Introduction/00_01 - Welcome.mp4 24MB
- 01. Network Security/01_03 - Comparing passive and active network attacks.mp4 18MB
- 05. Secure Sockets Layer (SSL)/05_02 - Exploring the security of SSL with Wireshark.mp4 17MB
- 02. Symmetric Encryption/02_05 - Using Wireshark to crack WEP.mp4 15MB
- 01. Network Security/01_05 - Reviewing the history of cryptography.mp4 13MB
- 05. Secure Sockets Layer (SSL)/05_01 - Introducing Secure Sockets Layer (SSL).mp4 13MB
- 04. Hash Algorithms, Message Digests, and Authentication/04_01 - Diving into hash algorithms and message digests.mp4 12MB
- 01. Network Security/01_04 - Introducing common cryptographic concepts and terminology.mp4 12MB
- 07. Internet Protocol Security/07_01 - Exploring Internet Protocol Security (IPsec).mp4 11MB
- 02. Symmetric Encryption/02_04 - Dissecting block and stream ciphers.mp4 11MB
- 02. Symmetric Encryption/02_03 - Working with the Advanced Encryption Standard (AES).mp4 11MB
- 02. Symmetric Encryption/02_02 - Making sense of the Feistel cipher.mp4 10MB
- 04. Hash Algorithms, Message Digests, and Authentication/04_05 - Solution Password strength tests.mp4 10MB
- 07. Internet Protocol Security/07_02 - Dissecting the authentication header.mp4 10MB
- 04. Hash Algorithms, Message Digests, and Authentication/04_02 - Looking deeper into message digests.mp4 9MB
- 03. Asymmetric Encryption and Digital Signatures/03_04 - Managing keys.mp4 9MB
- 03. Asymmetric Encryption and Digital Signatures/03_02 - Dissecting the public key algorithms RSA and Diffie-Hellman.mp4 9MB
- 03. Asymmetric Encryption and Digital Signatures/03_05 - Using certificates.mp4 9MB
- 06. Email Security/06_02 - Implementing PGP email security with GPG.mp4 8MB
- 01. Network Security/01_02 - Providing confidentiality, integrity authentication, and non-repudiation.mp4 8MB
- 07. Internet Protocol Security/07_04 - Using operating mechanisms.mp4 8MB
- 01. Network Security/01_01 - Understanding why encryption is necessary.mp4 8MB
- 06. Email Security/06_01 - Investigating email privacy and authentication concerns.mp4 7MB
- 07. Internet Protocol Security/07_03 - Encapsulating security payloads.mp4 6MB
- 03. Asymmetric Encryption and Digital Signatures/03_03 - Creating key pairs for the Diffie-Hellman algorithm.mp4 6MB
- 01. Network Security/01_06 - Challenge Coding with the Enigma machine.mp4 4MB
- 00. Introduction/00_04 - Challenges explained.mp4 3MB
- 07. Internet Protocol Security/08_01 - Next steps.mp4 3MB
- 04. Hash Algorithms, Message Digests, and Authentication/04_04 - Challenge Password strength tests.mp4 2MB
- 00. Introduction/00_02 - What you should know before watching this course.mp4 2MB
- 01. Network Security/01_07 - Solution Coding with the Enigma machine.mp4 1MB
- 00. Introduction/00_03 - Using the exercise files.mp4 474KB
- Ex_Files_Crypto.zip 13KB
- Torrent Downloaded From Katcr.co - Kickasstorrents.txt 52B