Home| All soft| Last soft| Your Orders| Customers opinion| Helpdesk| Cart

Program Search:


Shopping Cart:




*Note: Minimum order price: €20
We Recommend:

OReilly Media Infinite Skills Brian Sletten Encryption Training Video €20 buy download

2016
O'Reilly Media / Infinite Skills
Brian Sletten
7:15
English

Software developers world-wide place a great deal of trust in the encryption technologies used to protect privacy and sensitive data. What could go wrong? Plenty, says security and encryption expert Brian Sletten in this wide ranging overview of the history, methods, technologies, goals, and perhaps most importantly, limitations of encryption. The video offers a high level discussion of the theories behind encryption as well as a lower level detailed explanation of the technologies and methods used in encryption today.
- Receive a comprehensive overview of the history, methods, technologies, goals, and limitations of encryption
- Learn to make practical reasoned choices regarding the forms of encryption to avoid and the forms to deploy
- Explore stream ciphers, block ciphers, authenticated encryption systems, and symmetric key encryption
- Discover why the widely used MD-5 hashing algorithm should no longer be used for most encryption purposes
- Familiarize yourself with Transport Level Security (TLS), the most widely-used Internet encryption mechanism
- Learn to deploy DHKE, the asymmetric key exchange protocol for establishing encrypted Internet channels
- Understand RSA, the encryption features it enables, and why it's the standard for digitally-signing electronic documents
- Learn to recognize encryption attacks and why government demands for backdoors might cripple modern cryptography

01. Introduction
0101 Introduction to Video Series
0102 In the News
0103 Encoding vs Encryption
0104 Introduction to Hashing Algorithms
0105 Attacking Encryption With Brute Force
0106 Protecting Data At Rest vs In Transit
0107 The Encryption Key Exchange Problem
0108 Problems With Encryption Implementations
0109 The Importance of Random Number Generation and Entropy to Encryption
02. History
0201 Historical Substitution Ciphers
0202 Historical Transposition Ciphers
0203 The Historical Playfair Cipher
0204 Encryption During World War II
0205 Encryption After World War II
03. Stream Ciphers
0301 Overview of Stream Ciphers
0302 Details About the A5/1 Stream Cipher
0303 Details About the RC4 Stream Cipher
0304 Details About the Salsa20/ChaCha20 Stream Ciphers
04. Block Ciphers
0401 Overview of Block Ciphers
0402 What's Good and Bad With the Electronic Cookbook (ECB) Mode
0403 Improving Things With the Cipher Block Chaining (CBC) Mode
0404 Turning Block Ciphers Into Stream Ciphers With the Output Feedback (OFB) Mode
0405 Details About the Cipher Feedback (CFB) Mode
0406 What's Great About the Counter (CTR) Mode
05. Hashing Algorithms
0501 When Good Hashing Algorithms Go Bad
06. Authenticated Encryption
0601 Overview of Authenticated Encryption Systems
07. Symmetric Key Encryption
0701 Overview of Symmetric Key Encryption
0702 The Fascinating History of DES
0703 The Mechanics of DES
0704 How DES Was Cracked
0705 The Pleasing History of AES
0706 The Mechanics of AES
0707 Making AES Faster With Hardware Acceleration
08. Key Exchange
0801 The Fascinating History of Diffie-Hellman Key Exchange (DHKE)
0802 Mechanics of DHKE
0803 The History of RSA
09. Digital Signature
0901 Signing Documents with RSA
10. Elliptical Curves
1001 Overview of Elliptical Curve Cryptography (ECC)
11. TLS
1101 Overview of Transport Level Security (TLS)
1102 Setting Up Sessions with the TLS Handshake
1103 Picking Good TLS Ciphersuites
1104 Using OpenSSL
1105 Using Keybase.io
12. Encryption Technologies
1201 Using JSSE
1202 Encrypting Filesystems With DM-Crypt
13. Modern TLS Configuration
1301 Avoiding TLS Downgrades with HSTS
1302 Benefits of Certificate Pinning
1303 Benefits of OCSP Stapling
1304 The FREAK Attack
14. Next Steps
1401 Encouraging The Use of Encryption With Let's Encrypt
1402 The Impact of Quantum Computing on Encryption
1403 What to Expect From The Government and Encryption Laws
1404 Next Steps

oreilly.com, infiniteskills.com/training/encryption.html



Download File Size:1.88 GB


OReilly Media Infinite Skills Brian Sletten Encryption Training Video
€20
Customers who bought this program also bought:

Home| All Programs| Today added Progs| Your Orders| Helpdesk| Shopping cart      





Adobe Photoshop 2022 €90

             

Adobe Illustrator 2022 €75






9327 Fantasy & Sci-Fi eBooks Collection 9327 PDF Books eBook €60


Cambridge University History Collection PDF eBooks €100

                   





CorelDRAW Graphics Suite 2021.5 for Mac €65

             

Adobe Master Collection 2021 for Mac €260