#Security
Автор: SECourses
Загружено: 2020-10-24
Просмотров: 1130
#IT #IoT #Hacking #Internet #Computer #Cyber #Attack #Injection #Attacks #Course
Hello everyone. My name is Furkan Gözükara, and I am a Computer Engineer Ph.D. Assistant Professor at the Software Engineering department.
Invite link of the Discord channel of the course is : / discord
In this course, we will learn general overview and some in depth information about how to secure online information systems.
Security of online systems and IT is a whole area of profession. You can become expert of this area and find very well paying jobs.
Security of Information Systems Full Course Playlist : • Cyber Security Full Course for Beginners -...
GitHub repository of the course : https://github.com/FurkanGozukara/Sec...
Discord channel link of the course : / discord
How to use Discord : • How to Use Discord - Register Free Account...
This course does not require you to have any knowledge about programming in any programming language.
However, if you want to start learning programming or develop your other Software Engineering related skills you can watch our below full courses:
[1] Introduction to Programming Full Course with C# playlist : • C# Tutorial: Full Course For Beginners 👨💻...
[2] Object Oriented Programming Full Course with C# playlist : • C# Programming (Expert/Master) Object Orie...
[3] Artificial Intelligence (AI) and Machine Learning (ML) Full Course with C# Examples playlist: • Artificial Intelligence (AI) and Machine L...
[4] Software Engineering Full Course playlist : • Software Engineering Full Course
[5] Security of Information Systems Full Course playlist : • Cyber Security Full Course for Beginners -...
[6] (Turkish) Bilgisayar Becerileri Tam Ders playlist : • Bilgisayar Becerileri Tüm Ders Videoları. ...
Lecture 3 :
** Cryptography
The security pyramid
What is cryptology?
Terminology
Model of symmetric cryptosystem
Caesar cipher
Numerical encoding of the alphabet
Shift cipher
Exhaustive search
Substitution cipher - example
Enigma
Enigma key list
Practical complexity for attacking Enigma
Attacking ENIGMA
Cryptanalysis: Attacking Cryptosystems
Brute-Force Attack (or Exhaustive Key Search)
Attack models:
Does secure ciphers exist?
ETCRRM
White House Crypto Room 1960s
Producing key tape for the one-time pad
Symmetric encryption
Stream Cipher vs. Block Cipher
Symmetric stream cipher
Linear feedback shift register (LFSR)
Symmetric block cipher
Itrerated block cipher design
Substitution-Permutation network (SPN):
Data Encryption Standard (DES)
DES architecture
EFF DES-cracker
DES Status
Advanced Encryption Standard
Rijndael round function
Rijndael encryption
Block Ciphers: Modes of Operation
Use a secure mode!
Integrity Check Functions
Hash functions
Applications of hash functions
Hash functions (message digest functions)
Properties of hash functions
Frequently used hash functions
Hash collision
Collision attack
Brute force attack
Understanding Password Hash Salting
Why Salts Make Cracking More Difficult
Why Strong Passwords are Important
How Crackable Is a Given Password
Rainbow password tables
MD5 , SHA-1 ,SHA-256 , SHA-384 , SHA-512 , RIPEMD-16
Auto timed subtitle : OK
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: