Details for this torrent 

Lynda - Learning Cryptography and Network Security
Type:
Other > Other
Files:
37
Size:
457.18 MiB (479387098 Bytes)
Uploaded:
2017-07-16 22:07:03 GMT
By:
sumi VIP
Seeders:
2
Leechers:
0
Comments
0  

Info Hash:
C23A8FE84A5DC46DEAF45E9C639ADB9E7D5435F7




(Problems with magnets links are fixed by upgrading your torrent client!)
Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and provides a demonstration of a typical SSL transaction. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely.
Topics include:
Understanding why encryption is necessary
Comparing passive and active network attacks
Reviewing the terminology and history of cryptography
Using symmetric encryption
Dissecting block and stream ciphers
Dissecting the public-key algorithms
Creating key pairs
Understanding passwords, hash, salt, and rainbow tables
Exploring Secure Sockets Layer
Investigating email and IP security

00. Introduction/00_01 - Welcome.mp424.25 MiB
00. Introduction/00_02 - What you should know before watching this course.mp41.72 MiB
00. Introduction/00_03 - Using the exercise files.mp4473.73 KiB
00. Introduction/00_04 - Challenges explained.mp43.15 MiB
01. Network Security/01_01 - Understanding why encryption is necessary.mp47.98 MiB
01. Network Security/01_02 - Providing confidentiality, integrity authentication, and non-repudiation.mp48.34 MiB
01. Network Security/01_03 - Comparing passive and active network attacks.mp418.31 MiB
01. Network Security/01_04 - Introducing common cryptographic concepts and terminology.mp411.59 MiB
01. Network Security/01_05 - Reviewing the history of cryptography.mp412.89 MiB
01. Network Security/01_06 - Challenge Coding with the Enigma machine.mp43.79 MiB
01. Network Security/01_07 - Solution Coding with the Enigma machine.mp41.33 MiB
02. Symmetric Encryption/02_01 - Introducing symmetric encryption.mp474.09 MiB
02. Symmetric Encryption/02_02 - Making sense of the Feistel cipher.mp410.42 MiB
02. Symmetric Encryption/02_03 - Working with the Advanced Encryption Standard (AES).mp411.08 MiB
02. Symmetric Encryption/02_04 - Dissecting block and stream ciphers.mp411.1 MiB
02. Symmetric Encryption/02_05 - Using Wireshark to crack WEP.mp414.84 MiB
03. Asymmetric Encryption and Digital Signatures/03_01 - Overview and cryptographic requirements.mp459.73 MiB
03. Asymmetric Encryption and Digital Signatures/03_02 - Dissecting the public key algorithms RSA and Diffie-Hellman.mp49.13 MiB
03. Asymmetric Encryption and Digital Signatures/03_03 - Creating key pairs for the Diffie-Hellman algorithm.mp46 MiB
03. Asymmetric Encryption and Digital Signatures/03_04 - Managing keys.mp49.32 MiB
03. Asymmetric Encryption and Digital Signatures/03_05 - Using certificates.mp48.66 MiB
04. Hash Algorithms, Message Digests, and Authentication/04_01 - Diving into hash algorithms and message digests.mp412.04 MiB
04. Hash Algorithms, Message Digests, and Authentication/04_02 - Looking deeper into message digests.mp49.32 MiB
04. Hash Algorithms, Message Digests, and Authentication/04_03 - Understanding passwords, hash, salt, and rainbow tables.mp432.66 MiB
04. Hash Algorithms, Message Digests, and Authentication/04_04 - Challenge Password strength tests.mp41.79 MiB
04. Hash Algorithms, Message Digests, and Authentication/04_05 - Solution Password strength tests.mp410.02 MiB
05. Secure Sockets Layer (SSL)/05_01 - Introducing Secure Sockets Layer (SSL).mp412.54 MiB
05. Secure Sockets Layer (SSL)/05_02 - Exploring the security of SSL with Wireshark.mp417.17 MiB
06. Email Security/06_01 - Investigating email privacy and authentication concerns.mp46.73 MiB
06. Email Security/06_02 - Implementing PGP email security with GPG.mp48.46 MiB
07. Internet Protocol Security/07_01 - Exploring Internet Protocol Security (IPsec).mp411.17 MiB
07. Internet Protocol Security/07_02 - Dissecting the authentication header.mp49.8 MiB
07. Internet Protocol Security/07_03 - Encapsulating security payloads.mp46.09 MiB
07. Internet Protocol Security/07_04 - Using operating mechanisms.mp48.03 MiB
07. Internet Protocol Security/08_01 - Next steps.mp43.15 MiB
Ex_Files_Crypto.zip12.99 KiB
Torrent Downloaded From Katcr.co - Kickasstorrents.txt52 B