17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
The Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In this installment, Mike covers the objectives of Cryptography, the fifth domain, which comprises 9% of the questions on the exam. Topics include encryption, symmetric cryptography, and asymmetric cryptography. Learn about key management, working with digital certificates, and secure transport protocols. Plus, learn how to recognize and defend your organization against the most common types of cryptanalytic attacks: brute force and knowledge-based attacks.
To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction/001. Protecting data with cryptography.mp4
16.6 MB
~Get Your Files Here !/2. Encryption/002. Understanding encryption.mp4
23.7 MB
~Get Your Files Here !/2. Encryption/003. Symmetric and asymmetric cryptography.mp4
36.3 MB
~Get Your Files Here !/2. Encryption/004. Goals of cryptography.mp4
34.4 MB
~Get Your Files Here !/2. Encryption/005. Codes and ciphers.mp4
26 MB
~Get Your Files Here !/2. Encryption/006. Choosing encryption algorithms.mp4
29.2 MB
~Get Your Files Here !/2. Encryption/007. The perfect encryption algorithm.mp4
28.6 MB
~Get Your Files Here !/2. Encryption/008. The cryptographic lifecycle.mp4
21.7 MB
~Get Your Files Here !/3. Symmetric Cryptography/009. Data encryption standard.mp4
24.1 MB
~Get Your Files Here !/3. Symmetric Cryptography/010. 3DES.mp4
25.3 MB
~Get Your Files Here !/3. Symmetric Cryptography/011. AES, Blowfish, and Twofish.mp4
49 MB
~Get Your Files Here !/3. Symmetric Cryptography/012. RC4.mp4
17 MB
~Get Your Files Here !/3. Symmetric Cryptography/013. Steganography.mp4
33.5 MB
~Get Your Files Here !/4. Asymmetric Cryptography/014. Rivest-Shamir-Adleman (RSA).mp4
23.9 MB
~Get Your Files Here !/4. Asymmetric Cryptography/015. PGP and GnuPG.mp4
17.1 MB
~Get Your Files Here !/4. Asymmetric Cryptography/016. Elliptic curve and quantum cryptography.mp4
23.3 MB
~Get Your Files Here !/5. Key Management/017. Cryptographic key security.mp4
23.4 MB
~Get Your Files Here !/5. Key Management/018. Key exchange.mp4
23.1 MB
~Get Your Files Here !/5. Key Management/019. Diffie-Hellman.mp4
38.5 MB
~Get Your Files Here !/5. Key Management/020. Key escrow.mp4
25.3 MB
~Get Your Files Here !/5. Key Management/021. Key stretching.mp4
14.3 MB
~Get Your Files Here !/6. Public Key Infrastructure/022. Trust models.mp4
24.3 MB
~Get Your Files Here !/6. Public Key Infrastructure/023. PKI and digital certificates.mp4
34.7 MB
~Get Your Files Here !/6. Public Key Infrastructure/024. Hash functions.mp4
64.6 MB
~Get Your Files Here !/6. Public Key Infrastructure/025. Digital signatures.mp4
33.2 MB
~Get Your Files Here !/6. Public Key Infrastructure/026. Create a digital certificate.mp4
42.4 MB
~Get Your Files Here !/6. Public Key Infrastructure/027. Revoke a digital certificate.mp4
14.5 MB
~Get Your Files Here !/6. Public Key Infrastructure/028. Certificate stapling.mp4
21.2 MB
~Get Your Files Here !/6. Public Key Infrastructure/029. Certificate authorities.mp4
55.2 MB
~Get Your Files Here !/6. Public Key Infrastructure/030. Certificate subjects.mp4
30.7 MB
~Get Your Files Here !/6. Public Key Infrastructure/031. Certificate types.mp4
25.1 MB
~Get Your Files Here !/6. Public Key Infrastructure/032. Certificate formats.mp4
13 MB
~Get Your Files Here !/7. Transport Encryption/033. TLS and SSL.mp4
31.1 MB
~Get Your Files Here !/7. Transport Encryption/034. IPsec.mp4
24.9 MB
~Get Your Files Here !/7. Transport Encryption/035. Securing common protocols.mp4
70.9 MB
~Get Your Files Here !/7. Transport Encryption/036. DKIM.mp4
18.4 MB
~Get Your Files Here !/7. Transport Encryption/037. Tor and perfect forward secrecy.mp4
45.6 MB
~Get Your Files Here !/7. Transport Encryption/038. Blockchain.mp4
15.3 MB
~Get Your Files Here !/8. Cryptanalytic Attacks/039. Brute-force attacks.mp4
25.3 MB
~Get Your Files Here !/8. Cryptanalytic Attacks/040. Knowledge-based attacks.mp4
23.1 MB
~Get Your Files Here !/8. Cryptanalytic Attacks/041. Limitations of encryption algorithms.mp4
23.3 MB
~Get Your Files Here !/9. Conclusion/042. Continuing your studies.mp4