cyber

  • Period: to

    cyber

  • MARK_FileHashingExercise

    Changing the hashes
  • HashingAlgorithmResearch

    types of hashes
    purpose of hashes
  • Mark_Quiz_1

    type of hackers
    dealing with hackers
  • Mark_Quiz_2

    security devices
    key encryption
    technologies
  • Mark_Quiz_3

  • Thoughts on Kevin Mitnick interview (key points on Word)

  • Symmetric/Asymmetric Examples

  • 1st Cipher Chart from lesson practical

  • Google Data Centre / Security Key

  • 1st PKA Lab - Creating a Cyber World

  • configure the FTP server

    The File Transfer Protocol ( FTP) is a standard network protocol used for the transfer of computer file between a client and server on a computer network.
  • configure the web server

    A web server is computer software and underlying hardware that accepts requests via HTTP, the network protocol created to distribute web pages, or its secure variant HTTPS.
  • configure the email server

    An email server, or simply mail server, is an application or computer in a network whose sole purpose is to act as a virtual post office.
  • configure the DNS server

    The Domain Name System ( DNS) is the phonebook of the Internet.
  • configure the NTP server

    Local (aka internal) NTP servers are those you own yourself and install in your premises, establishing a physical network connection between your servers and clients.
  • configure the AAA server

    An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.