Lynda - Learning Cryptography and Network Security

Photo unavailable
Category:
Date:
07/16/17 at 9:27pm GMT+1
Submitter:
Seeders:
1
Leechers:
0
File size:
457 MB in 36 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
c23a8fe84a5dc46deaf45e9c639adb9e7d5435f7


File list

  • Lynda - Learning Cryptography and Network Security
  • icon 00. Introduction/00_01 - Welcome.mp4 24.3 MB
    icon 00. Introduction/00_02 - What you should know before watching this course.mp4 1.7 MB
    icon 00. Introduction/00_03 - Using the exercise files.mp4 473.7 KB
    icon 00. Introduction/00_04 - Challenges explained.mp4 3.2 MB
    icon 01. Network Security/01_01 - Understanding why encryption is necessary.mp4 8 MB
    icon 01. Network Security/01_02 - Providing confidentiality, integrity authentication, and non-repudiation.mp4 8.3 MB
    icon 01. Network Security/01_03 - Comparing passive and active network attacks.mp4 18.3 MB
    icon 01. Network Security/01_04 - Introducing common cryptographic concepts and terminology.mp4 11.6 MB
    icon 01. Network Security/01_05 - Reviewing the history of cryptography.mp4 12.9 MB
    icon 01. Network Security/01_06 - Challenge Coding with the Enigma machine.mp4 3.8 MB
    icon 01. Network Security/01_07 - Solution Coding with the Enigma machine.mp4 1.3 MB
    icon 02. Symmetric Encryption/02_01 - Introducing symmetric encryption.mp4 74.1 MB
    icon 02. Symmetric Encryption/02_02 - Making sense of the Feistel cipher.mp4 10.4 MB
    icon 02. Symmetric Encryption/02_03 - Working with the Advanced Encryption Standard (AES).mp4 11.1 MB
    icon 02. Symmetric Encryption/02_04 - Dissecting block and stream ciphers.mp4 11.1 MB
    icon 02. Symmetric Encryption/02_05 - Using Wireshark to crack WEP.mp4 14.8 MB
    icon 03. Asymmetric Encryption and Digital Signatures/03_01 - Overview and cryptographic requirements.mp4 59.7 MB
    icon 03. Asymmetric Encryption and Digital Signatures/03_02 - Dissecting the public key algorithms RSA and Diffie-Hellman.mp4 9.1 MB
    icon 03. Asymmetric Encryption and Digital Signatures/03_03 - Creating key pairs for the Diffie-Hellman algorithm.mp4 6 MB
    icon 03. Asymmetric Encryption and Digital Signatures/03_04 - Managing keys.mp4 9.3 MB
    icon 03. Asymmetric Encryption and Digital Signatures/03_05 - Using certificates.mp4 8.7 MB
    icon 04. Hash Algorithms, Message Digests, and Authentication/04_01 - Diving into hash algorithms and message digests.mp4 12 MB
    icon 04. Hash Algorithms, Message Digests, and Authentication/04_02 - Looking deeper into message digests.mp4 9.3 MB
    icon 04. Hash Algorithms, Message Digests, and Authentication/04_03 - Understanding passwords, hash, salt, and rainbow tables.mp4 32.7 MB
    icon 04. Hash Algorithms, Message Digests, and Authentication/04_04 - Challenge Password strength tests.mp4 1.8 MB
    icon 04. Hash Algorithms, Message Digests, and Authentication/04_05 - Solution Password strength tests.mp4 10 MB
    icon 05. Secure Sockets Layer (SSL)/05_01 - Introducing Secure Sockets Layer (SSL).mp4 12.5 MB
    icon 05. Secure Sockets Layer (SSL)/05_02 - Exploring the security of SSL with Wireshark.mp4 17.2 MB
    icon 06. Email Security/06_01 - Investigating email privacy and authentication concerns.mp4 6.7 MB
    icon 06. Email Security/06_02 - Implementing PGP email security with GPG.mp4 8.5 MB
    icon 07. Internet Protocol Security/07_01 - Exploring Internet Protocol Security (IPsec).mp4 11.2 MB
    icon 07. Internet Protocol Security/07_02 - Dissecting the authentication header.mp4 9.8 MB
    icon 07. Internet Protocol Security/07_03 - Encapsulating security payloads.mp4 6.1 MB
    icon 07. Internet Protocol Security/07_04 - Using operating mechanisms.mp4 8 MB
    icon 07. Internet Protocol Security/08_01 - Next steps.mp4 3.1 MB
    icon Ex_Files_Crypto.zip 13 KB

Similar Torrents