Cryptography for Cyber Security and BlockChain Bangla Tutorial #Class 01 :Course Introduction
Hey, Welcome to our New Course Cryptography for Cyber Security and BlockChain.In this course we will learn:
Fundamentals
1. Introduction
2. What is Cryptography
3. Roles of cryptography in Communication
4. What is Cyber Security
5. Roles of Cryptography in cyber security
6. What is Blockchain
7. Why Blockchain is called a decentralized System
8. Roles of Cryptography in Blockchain
Cryptography Core
9. What is Cryptography & Why it is needed
10. Cryptography Key Terms
11. Classification of Cryptography
12. Cryptanalysis
13. Classical encryption Techniques
14. Brute-Force attack
15. Crypto-Technique 1 (Caesar Cipher)
16. Crypto-Technique 2 (Monoalphabetic Cipher)
17. Crypto-Technique 3 (PlayFair Cipher)
18. Crypto-Technique 4 (Hill-Cipher)
19. Crypto-Technique 5 (Block Cipher)
20. Crypto-Technique 6 (Stream Cipher)
21. Crypto-Technique 7 (Poly-Alphabetic Cipher)
22. Crypto-Technique 8 (One Time Pad)
23. Crypto-Technique 9 (Rail-Fence Technique)
24. Crypto-Technique 10 (Row Column Transposition Technique)
25. Crypto-Technique 11 (RSA Algorithm)
26. Crypto-Technique 12 (DSA Algorithm)
27. Mastering The Hash 13
28. Classification of hash and its application
29. MD5, SHA128, SHA256, SHA512, oracle Fundamentals
30. Problem-solving using hash
31. Doubt solving according to your comments and suggestion
32. End Lecture and lots of love ….
🧨 Disclaimer 🎃
All videos and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos uploaded in CyberTeach360 Youtube Channel are only for those are interested to learn about Ethical Hacking, Security, Penetration Testing, and malware analysis. Hacking tutorials are against the misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.
✅ Follow Us 🆗
🔈Facebook: https://www.facebook.com/foysalahammad.farabi
🔊Twitter: https://twitter.com/0x_foysal
📗Github: https://github.com/cyberteach360
✅Facebook Helping Group:https://www.facebook.com/groups/cyberbanglalive
🆓 Facebook Page Link:https://www.facebook.com/cyb3rbangla
✅Telegram Channel:https://t.me/+myMim9UxT61mNGY1
👀Telegram Group:https://t.me/+8DHIIwdT9fY5OGI1
#hacking #hack #ethicalhacking #cybersecurity #bugbounty #ctf #blockchain #crypto
😊 Thank you!!! 😊
Views : 1026
cyber security