renato
10 diciembre 2019, 05:13
https://i111.fastpic.ru/big/2019/1210/e9/22b4a8863202f465e9160f7a71dd0ce9.jpg
Ethical Hacking: Cryptography
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 59m | 102 MB
Instructor: Stephanie Domas
While the science of cryptography-in which data is mathematically scrambled-has roots in the protection of top-secret military communications, modern cryptography helps secure information for anyone with an email account. Cryptography techniques and practices are used for authentication, data integrity, confidentiality, and non-repudiation. In this course, Stephanie Domas takes this traditionally complex topic and breaks it down into understandable and approachable segments. Stephanie covers the basic principles of cryptography and the most popular algorithms (and how they're used,) as well as attack strategies and methodologies. Learn about the different types of cyphers, hashing, digital certificates, public key infrastructure (PKI) components, and more.
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
Topics include:
Different types of cryptography
Symmetric and asymmetric encryption
Cryptographic hashing
How digital certificates work
Public key infrastructure (PKI) components
Protocols that use cryptography
Common types of cryptographic attacks
More Info
https://www.lynda.com/IT-tutorials/Ethical-Hacking-Cryptography/2813285-2.html
https://i111.fastpic.ru/big/2019/1210/a2/0eec08a88c7ad69b0474cebf0b136ca2.jpg
xEthical Hacking: Cryptography
https://i111.fastpic.ru/big/2019/1210/50/3c624ad5d3c387d655b744393a058050.jpg
Close
Download ( Rapidgator )
https://rapidgator.net/file/49b6c19a31c0db73099c2ab1268e0cf3/jh4nz.Ethical.Hacking.Cryptography.rar
Download ( NitroFlare )
http://nitroflare.com/view/567252D10445695/jh4nz.Ethical.Hacking.Cryptography.rar
Ethical Hacking: Cryptography
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 59m | 102 MB
Instructor: Stephanie Domas
While the science of cryptography-in which data is mathematically scrambled-has roots in the protection of top-secret military communications, modern cryptography helps secure information for anyone with an email account. Cryptography techniques and practices are used for authentication, data integrity, confidentiality, and non-repudiation. In this course, Stephanie Domas takes this traditionally complex topic and breaks it down into understandable and approachable segments. Stephanie covers the basic principles of cryptography and the most popular algorithms (and how they're used,) as well as attack strategies and methodologies. Learn about the different types of cyphers, hashing, digital certificates, public key infrastructure (PKI) components, and more.
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
Topics include:
Different types of cryptography
Symmetric and asymmetric encryption
Cryptographic hashing
How digital certificates work
Public key infrastructure (PKI) components
Protocols that use cryptography
Common types of cryptographic attacks
More Info
https://www.lynda.com/IT-tutorials/Ethical-Hacking-Cryptography/2813285-2.html
https://i111.fastpic.ru/big/2019/1210/a2/0eec08a88c7ad69b0474cebf0b136ca2.jpg
xEthical Hacking: Cryptography
https://i111.fastpic.ru/big/2019/1210/50/3c624ad5d3c387d655b744393a058050.jpg
Close
Download ( Rapidgator )
https://rapidgator.net/file/49b6c19a31c0db73099c2ab1268e0cf3/jh4nz.Ethical.Hacking.Cryptography.rar
Download ( NitroFlare )
http://nitroflare.com/view/567252D10445695/jh4nz.Ethical.Hacking.Cryptography.rar