Download link
File List
-
Get Bonus Downloads Here.url 182 B
~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 30.36 MB
~Get Your Files Here !/1 - Introduction/2 - What you will learn.mp4 30.61 MB
~Get Your Files Here !/2 - Basic Concepts/10 - Prime Numbers.mp4 1.12 MB
~Get Your Files Here !/2 - Basic Concepts/11 - Basic-Concepts.pdf 1.06 MB
~Get Your Files Here !/2 - Basic Concepts/11 - Summary.mp4 5.34 MB
~Get Your Files Here !/2 - Basic Concepts/3 - Objectives.mp4 4.16 MB
~Get Your Files Here !/2 - Basic Concepts/4 - What is the challenge with communication across an untrusted medium.mp4 8.99 MB
~Get Your Files Here !/2 - Basic Concepts/5 - What is Cryptography.mp4 6.76 MB
~Get Your Files Here !/2 - Basic Concepts/6 - Security by obscurity is not security.mp4 5.92 MB
~Get Your Files Here !/2 - Basic Concepts/7 - Why learn Cryptography.mp4 7.83 MB
~Get Your Files Here !/2 - Basic Concepts/8 - The key is the key.mp4 6.01 MB
~Get Your Files Here !/2 - Basic Concepts/9 - Data Representation and Number System.mp4 141.64 MB
~Get Your Files Here !/3 - Cryptosystems/12 - Objectives.mp4 2.71 MB
~Get Your Files Here !/3 - Cryptosystems/13 - Key terms related to cryptography.mp4 6.19 MB
~Get Your Files Here !/3 - Cryptosystems/14 - Overview of Cryptology.mp4 3.37 MB
~Get Your Files Here !/3 - Cryptosystems/15 - Modulo Functions.mp4 4.44 MB
~Get Your Files Here !/3 - Cryptosystems/16 - Monoalphabetic and Polyalphabetic Ciphers.mp4 2.62 MB
~Get Your Files Here !/3 - Cryptosystems/17 - Caesar Cipher.mp4 3.08 MB
~Get Your Files Here !/3 - Cryptosystems/18 - Demo Caesar Cipher.mp4 26.45 MB
~Get Your Files Here !/3 - Cryptosystems/19 - Vigenere Cipher.mp4 3.25 MB
~Get Your Files Here !/3 - Cryptosystems/20 - Demo Vigenere Cipher.mp4 14.61 MB
~Get Your Files Here !/3 - Cryptosystems/21 - The unbreakable cipher.mp4 6.13 MB
~Get Your Files Here !/3 - Cryptosystems/22 - Goals of Cryptography.mp4 5.6 MB
~Get Your Files Here !/3 - Cryptosystems/23 - Cryptosystems.mp4 2.4 MB
~Get Your Files Here !/3 - Cryptosystems/24 - Keys.mp4 2.88 MB
~Get Your Files Here !/3 - Cryptosystems/25 - Key Space.mp4 4.63 MB
~Get Your Files Here !/3 - Cryptosystems/26 - Cryptography at a larger scale.mp4 6.99 MB
~Get Your Files Here !/3 - Cryptosystems/27 - The challenge of secure communication.mp4 4.85 MB
~Get Your Files Here !/3 - Cryptosystems/28 - XOR.mp4 4.47 MB
~Get Your Files Here !/3 - Cryptosystems/29 - Encryption.mp4 11.86 MB
~Get Your Files Here !/3 - Cryptosystems/30 - Decryption.mp4 1.12 MB
~Get Your Files Here !/3 - Cryptosystems/31 - Cryptosystems.pdf 1013.44 KB
~Get Your Files Here !/3 - Cryptosystems/31 - Summary.mp4 3.77 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/32 - Objectives.mp4 3.7 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/33 - Types of Cryptosystems.mp4 11.57 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/34 - Symmetric Key Cryptosystem.mp4 8.36 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/35 - Techniques in Symmetric Encryption.mp4 14.91 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/36 - Stream Ciphers.mp4 7.83 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/37 - Block Ciphers.mp4 5.13 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/38 - Modes of Operation of Block Ciphers.mp4 19.38 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/39 - Block Cipher Primitives Confusion and Diffusion.mp4 3.28 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/40 - DES.mp4 4.62 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/41 - Weakness in DES.mp4 5.8 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/42 - DES is not a Group.mp4 3.65 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/43 - Meet in the Middle Attack.mp4 6.64 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/44 - Demo DES.mp4 38.29 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/45 - 3DES.mp4 5.32 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/46 - AES.mp4 9.11 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/47 - AES Algorithm.mp4 8.11 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/48 - AES with CBC.mp4 2.73 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/49 - Demo AES.mp4 27.84 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/50 - Asymmetric Key Cryptosystem.mp4 6.78 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/51 - Problems with Symmetric Encryption.mp4 7.5 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/52 - Asymmetric Key Cryptosystems.mp4 10.85 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/53 - Mathematics behind Asymmetric Encryption.mp4 11.95 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/54 - Essential Number Theory for Public Key Algorithms.mp4 3.96 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/55 - Euclidean Algorithm.mp4 6.9 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/56 - Relative Prime Numbers.mp4 3.48 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/57 - Modular Exponentiation.mp4 15.18 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/58 - Multiplicative Inverse.mp4 4.12 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/59 - Main Use of Asymmetric keys.mp4 4.36 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/60 - Concepts in Cryptography.mp4 9.71 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/61 - Difficulty of Factoring a Large Integer into Its Two Prime Factors.mp4 3.97 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/62 - Difficulty of Solving the Discrete Logarithm Problem for Finite Fields.mp4 7.65 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/63 - Difficulty of Solving Discrete Logarithm Problem as Applied to Elliptic Curves.mp4 4.21 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/64 - RSA.mp4 7.27 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/65 - Basic Steps to Create an RSA Public Private Key Pair.mp4 26.44 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/66 - Elliptic Curve Cryptosystem.mp4 10.85 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/67 - DiffieHellman Key Exchange.mp4 3.54 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/68 - How does DiffieHellman work.mp4 15.69 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/69 - Demo DiffieHellman.mp4 12.52 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/70 - Hash Functions.mp4 8.11 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/71 - What is Collision in Hashing.mp4 3.88 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/72 - Use of Hash in Password.mp4 4.36 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/73 - MD5.mp4 4.72 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/74 - Secure Hash Algorithm.mp4 5.66 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/75 - Hash Based Message Authentication Code.mp4 7.76 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/76 - Cryptographic-Algorithms.pdf 2.11 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/76 - Summary.mp4 10.56 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/Rijndael_Animation_v4_eng/Rijndael_Animation_v4_eng.exe 1.09 MB
~Get Your Files Here !/4 - Cryptographic Algorithms/Rijndael_Animation_v4_eng/Rijndael_Animation_v4_eng.swf 152.7 KB
~Get Your Files Here !/5 - Applying Cryptography/100 - Digital Certificates.mp4 8.84 MB
~Get Your Files Here !/5 - Applying Cryptography/101 - Certificate Authority CA.mp4 17.43 MB
~Get Your Files Here !/5 - Applying Cryptography/102 - Key Management and Certificate Lifecycle.mp4 16.59 MB
~Get Your Files Here !/5 - Applying Cryptography/103 - Use cases of PKI Certificates.mp4 4.23 MB
~Get Your Files Here !/5 - Applying Cryptography/104 - PKI Components.mp4 5.55 MB
~Get Your Files Here !/5 - Applying Cryptography/105 - Digital Signature.mp4 9.53 MB
~Get Your Files Here !/5 - Applying Cryptography/106 - Demo Digital Signatures.mp4 13.42 MB
~Get Your Files Here !/5 - Applying Cryptography/107 - Applying-Cryptography.pdf 1.6 MB
~Get Your Files Here !/5 - Applying Cryptography/107 - Summary.mp4 7.73 MB
~Get Your Files Here !/5 - Applying Cryptography/77 - Objectives.mp4 4.69 MB
~Get Your Files Here !/5 - Applying Cryptography/78 - Transport Layer Security.mp4 13.49 MB
~Get Your Files Here !/5 - Applying Cryptography/79 - Cipher Suite.mp4 4.04 MB
~Get Your Files Here !/5 - Applying Cryptography/80 - Typical Enterprise Network.mp4 4.39 MB
~Get Your Files Here !/5 - Applying Cryptography/81 - Virtual Private Networks.mp4 9.17 MB
~Get Your Files Here !/5 - Applying Cryptography/82 - VPN Advantages.mp4 4.54 MB
~Get Your Files Here !/5 - Applying Cryptography/83 - VPN Disadvantages.mp4 3.29 MB
~Get Your Files Here !/5 - Applying Cryptography/84 - Types of Remote Access VPN.mp4 7.53 MB
~Get Your Files Here !/5 - Applying Cryptography/85 - IP Security Protocol.mp4 4.94 MB
~Get Your Files Here !/5 - Applying Cryptography/86 - Authentication Header AH.mp4 15.71 MB
~Get Your Files Here !/5 - Applying Cryptography/87 - Encapsulating Security Payload ESP.mp4 15.88 MB
~Get Your Files Here !/5 - Applying Cryptography/88 - Security Associations SA.mp4 8.26 MB
~Get Your Files Here !/5 - Applying Cryptography/89 - Transport Mode.mp4 4 MB
~Get Your Files Here !/5 - Applying Cryptography/90 - Tunnel Mode.mp4 5.37 MB
~Get Your Files Here !/5 - Applying Cryptography/91 - IPsec Key Management.mp4 24.03 MB
~Get Your Files Here !/5 - Applying Cryptography/92 - SSL VPN.mp4 4.69 MB
~Get Your Files Here !/5 - Applying Cryptography/93 - VPN Components.mp4 6.48 MB
~Get Your Files Here !/5 - Applying Cryptography/94 - Watch that VPN.mp4 7.68 MB
~Get Your Files Here !/5 - Applying Cryptography/95 - Secure Email with SMIME.mp4 19.42 MB
~Get Your Files Here !/5 - Applying Cryptography/96 - Demo SMIME.mp4 39.85 MB
~Get Your Files Here !/5 - Applying Cryptography/97 - Full Disk Encryption.mp4 16.95 MB
~Get Your Files Here !/5 - Applying Cryptography/98 - Problem of Asymmetric Algorithms.mp4 8.59 MB
~Get Your Files Here !/5 - Applying Cryptography/99 - Public Key Infrastructure PKI.mp4 3.83 MB
~Get Your Files Here !/Bonus Resources.txt 386 B
Download Info
-
Tips
“[ DevCourseWeb.com ] Udemy - Effective Cryptography” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.