Télécommunications

Cryptography for Cyber Security and BlockChain Bangla Tutorial #Class 01 :Course Introduction

Hey, Welcome to our New Course Cryptography for Cyber Security and BlockChain.In this course we will learn:

Fundamentals
1. Introduction
2. What is Cryptography
3. Roles of cryptography in Communication
4. What is Cyber Security
5. Roles of Cryptography in cyber security
6. What is Blockchain
7. Why Blockchain is called a decentralized System
8. Roles of Cryptography in Blockchain

Cryptography Core

9. What is Cryptography & Why it is needed
10. Cryptography Key Terms
11. Classification of Cryptography
12. Cryptanalysis
13. Classical encryption Techniques
14. Brute-Force attack
15. Crypto-Technique 1 (Caesar Cipher)
16. Crypto-Technique 2 (Monoalphabetic Cipher)
17. Crypto-Technique 3 (PlayFair Cipher)
18. Crypto-Technique 4 (Hill-Cipher)
19. Crypto-Technique 5 (Block Cipher)
20. Crypto-Technique 6 (Stream Cipher)
21. Crypto-Technique 7 (Poly-Alphabetic Cipher)
22. Crypto-Technique 8 (One Time Pad)
23. Crypto-Technique 9 (Rail-Fence Technique)
24. Crypto-Technique 10 (Row Column Transposition Technique)
25. Crypto-Technique 11 (RSA Algorithm)
26. Crypto-Technique 12 (DSA Algorithm)
27. Mastering The Hash 13
28. Classification of hash and its application
29. MD5, SHA128, SHA256, SHA512, oracle Fundamentals
30. Problem-solving using hash
31. Doubt solving according to your comments and suggestion
32. End Lecture and lots of love ….

🧨 Disclaimer 🎃
All videos and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos uploaded in CyberTeach360 Youtube Channel are only for those are interested to learn about Ethical Hacking, Security, Penetration Testing, and malware analysis. Hacking tutorials are against the misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.

✅ Follow Us 🆗

🔈Facebook: https://www.facebook.com/foysalahammad.farabi

🔊Twitter: https://twitter.com/0x_foysal

📗Github: https://github.com/cyberteach360

✅Facebook Helping Group:https://www.facebook.com/groups/cyberbanglalive

🆓 Facebook Page Link:https://www.facebook.com/cyb3rbangla

✅Telegram Channel:https://t.me/+myMim9UxT61mNGY1
👀Telegram Group:https://t.me/+8DHIIwdT9fY5OGI1

#hacking #hack #ethicalhacking #cybersecurity #bugbounty #ctf #blockchain #crypto
😊 Thank you!!! 😊

Views : 1026
cyber security

Source by Cyber Teach 360

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *