Encryption Training Video - Infinite Skills
English | Size: 1.93 GB (2,067,766,336 Bytes)
Category: CBTs
Software developers world-wide place a great deal of trust in the encryption technologies used to protect privacy and sensitive data. What could go wrong? Plenty, says security and encryption expert Brian Sletten in this wide ranging overview of the history, methods, technologies, goals, and perhaps most importantly, limitations of encryption. The video offers a high level discussion of the theories behind encryption as well as a lower level detailed explanation of the technologies and methods used in encryption today.
- Receive a comprehensive overview of the history, methods, technologies, goals, and
limitations of encryption
- Learn to make practical reasoned choices regarding the forms of encryption to avoid and
the forms to deploy
- Explore stream ciphers, block ciphers, authenticated encryption systems, and symmetric key
encryption
- Discover why the widely used MD-5 hashing algorithm should no longer be used for most
encryption purposes
- Familiarize yourself with Transport Level Security (TLS), the most widely-used Internet
encryption mechanism
- Learn to deploy DHKE, the asymmetric key exchange protocol for establishing encrypted
Internet channels
- Understand RSA, the encryption features it enables, and why it's the standard for digitally-
signing electronic documents
- Learn to recognize encryption attacks and why government demands for backdoors might
cripple modern cryptography
Download link:
Links are Interchangeable - No Password - Single Extraction
Konuyu Favori Sayfanıza Ekleyin