Lynda - Essentials of Cryptography and Network Security

seeders: 2
leechers: 8
Added on July 20, 2015 by welovfreein Other > Tutorials
Torrent verified.



Lynda - Essentials of Cryptography and Network Security (Size: 317.34 MB)
 ly_00_04_XR15_Challenges.mp43.21 MB
 ly_00_01_WL30_Welcome.mp410.51 MB
 ly_00_02_XR15_WSK.mp41.76 MB
 ly_00_03_XR15_EX_REG.mp4488.94 KB
 ly_01_07_SO30_XR30_solution.mp41.32 MB
 ly_01_04_XR15_terms.mp411.36 MB
 ly_01_01_XR15_why.mp47.93 MB
 ly_01_02_XR15_services.mp48.27 MB
 ly_01_03_XR15_attacks.mp418.33 MB
 ly_01_05_XR15_history.mp412.85 MB
 ly_01_06_CH30_XR30_challenge.mp43.78 MB
 ly_02_02_XR15_Feistel.mp410.5 MB
 ly_02_01_LA30_SymEnc.mp418.51 MB
 ly_02_05_XR15_WEP_Demo.mp415.01 MB
 ly_02_03_XR15_AES.mp411.06 MB
 ly_02_04_XR15_Block_Stream.mp411.22 MB
 ly_03_02_XR15_Public_KeyTECH.mp49.13 MB
 ly_03_04_XR15_Key_Management.mp49.41 MB
 ly_03_03_XR15_DH_EX.mp46.04 MB
 ly_03_01_LA30_AsyEnc.mp413.5 MB
 ly_03_05_XR15_Certificate.mp48.71 MB
 ly_04_01_XR15_hash.mp412.04 MB
 ly_04_04_CH30_XR30_Challenge.mp41.79 MB
 ly_04_03_LA30_Passwords.mp48.05 MB
 ly_04_02_XR15_Message_Digest.mp49.24 MB
 ly_04_05_SO30_XR30_Solution.mp49.95 MB
 ly_05_01_XR15_SSl.mp412.58 MB
 ly_05_02_XR15_Demo.mp417.28 MB
 ly_06_01_XR15_Email.mp46.78 MB
 ly_06_02_XR15_PGP.mp48.52 MB
 ly_07_03_XR15_IPSecESP.mp46.16 MB
 ly_07_04_XR15_IPSecMech.mp47.86 MB
 ly_07_02_XR15_IPSecAH.mp49.81 MB
 ly_07_01_XR15_IPSecOverview.mp411.18 MB
 ly_08_01_XR15_NextSteps.mp43.19 MB
 03_03_DiffieHellman.xlsx16.38 KB

Description

Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and provides a demonstration of a typical SSL transaction. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely.

Topics include:
•Understanding why encryption is necessary
•Comparing passive and active network attacks
•Reviewing the terminology and history of cryptography
•Using symmetric encryption
•Dissecting block and stream ciphers
•Dissecting the public-key algorithms
•Creating key pairs
•Understanding passwords, hash, salt, and rainbow tables
•Exploring Secure Sockets Layer
•Investigating email and IP security

Sharing Widget


Download torrent
317.34 MB
seeders:2
leechers:8
Lynda - Essentials of Cryptography and Network Security