Learning Outcome:
Requirement:
Course Curriculum
Cryptography Algorithms & Vulnerabilities
Available in
days
days
after you enroll
-
Start
01) Cryptographic theory - part 1
(23:05)
-
Start
02) Cryptography theory - part 2
(28:08)
-
Start
03) Asymmetric encryption
(21:59)
-
Start
04) Symmetric encryption
(17:09)
-
Start
05) Secure Socket Layer (SSL)
(17:55)
-
Start
06) Pretty Good Privacy (PGP)
(10:23)
-
Start
07) Advanced Encryption Standard (AES)
(10:31)
-
Start
08) Wifi security - WPA2
(8:43)
-
Start
09) Wifi security - WPA3
(12:14)
-
Start
10) Vulnerabilities - TLS1.3
(10:36)
-
Start
12) Breaking the hash
(8:46)
-
Start
13) Hashing analysis and basic encryption
(10:24)
-
Start
14) Creating password dictionary
(14:17)
-
Start
15) Networking and encrypting with Python
(27:42)
-
Start
16) File encryptor with C
(28:18)
-
Start
17) Brute forcing SSH service using Hydra
(10:59)
-
Start
18) Linux MAC passwords - theory
(10:47)
-
Start
19) Linux MAC passwords - practical
(9:31)
-
Start
20) How Windows manages passwords
(14:28)
-
Start
21) Windows passwords management
(7:25)
-
Start
22) Cracking passwords theory
(19:07)
-
Start
23) Cracking offline passwords with John
(9:58)
-
Start
24) Digital certificates
(20:03)
Cryptography Algorithms & Vulnerabilities
Available in
days
days
after you enroll
-
Start01) Cryptographic theory - part 1 (23:05)
-
Start02) Cryptography theory - part 2 (28:08)
-
Start03) Asymmetric encryption (21:59)
-
Start04) Symmetric encryption (17:09)
-
Start05) Secure Socket Layer (SSL) (17:55)
-
Start06) Pretty Good Privacy (PGP) (10:23)
-
Start07) Advanced Encryption Standard (AES) (10:31)
-
Start08) Wifi security - WPA2 (8:43)
-
Start09) Wifi security - WPA3 (12:14)
-
Start10) Vulnerabilities - TLS1.3 (10:36)
-
Start12) Breaking the hash (8:46)
-
Start13) Hashing analysis and basic encryption (10:24)
-
Start14) Creating password dictionary (14:17)
-
Start15) Networking and encrypting with Python (27:42)
-
Start16) File encryptor with C (28:18)
-
Start17) Brute forcing SSH service using Hydra (10:59)
-
Start18) Linux MAC passwords - theory (10:47)
-
Start19) Linux MAC passwords - practical (9:31)
-
Start20) How Windows manages passwords (14:28)
-
Start21) Windows passwords management (7:25)
-
Start22) Cracking passwords theory (19:07)
-
Start23) Cracking offline passwords with John (9:58)
-
Start24) Digital certificates (20:03)
Your Instructor
CIP Cyber
CIP Cyber is an initiative dedicated to protecting critical infrastructure from
cyber threats. Our vision is to empower the cybersecurity community to
defend critical infrastructure, and our mission is to connect, train, and certify
people to protect critical infrastructure.
Reviews
Your Instructor
CIP Cyber is an initiative dedicated to protecting critical infrastructure from
cyber threats. Our vision is to empower the cybersecurity community to
defend critical infrastructure, and our mission is to connect, train, and certify
people to protect critical infrastructure.
Course Curriculum
Cryptography Algorithms & Vulnerabilities
Available in
days
days
after you enroll
-
Start01) Cryptographic theory - part 1 (23:05)
-
Start02) Cryptography theory - part 2 (28:08)
-
Start03) Asymmetric encryption (21:59)
-
Start04) Symmetric encryption (17:09)
-
Start05) Secure Socket Layer (SSL) (17:55)
-
Start06) Pretty Good Privacy (PGP) (10:23)
-
Start07) Advanced Encryption Standard (AES) (10:31)
-
Start08) Wifi security - WPA2 (8:43)
-
Start09) Wifi security - WPA3 (12:14)
-
Start10) Vulnerabilities - TLS1.3 (10:36)
-
Start12) Breaking the hash (8:46)
-
Start13) Hashing analysis and basic encryption (10:24)
-
Start14) Creating password dictionary (14:17)
-
Start15) Networking and encrypting with Python (27:42)
-
Start16) File encryptor with C (28:18)
-
Start17) Brute forcing SSH service using Hydra (10:59)
-
Start18) Linux MAC passwords - theory (10:47)
-
Start19) Linux MAC passwords - practical (9:31)
-
Start20) How Windows manages passwords (14:28)
-
Start21) Windows passwords management (7:25)
-
Start22) Cracking passwords theory (19:07)
-
Start23) Cracking offline passwords with John (9:58)
-
Start24) Digital certificates (20:03)
Frequently Asked Questions
When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.