-
Period: to
cyber
cyber -
Mark_Quiz_1
three detention
types of hackers
dealing with hackers -
Mark_Quiz_2
security devices
key encryption
technologies -
MARK_FileHashingExercise
changing the hashes
crating own hashes
types of hashes -
Mark_Quiz_3
-
HashingAlgorithmResearch
types of hashes
purpose of hashes
description of hashes -
1st PKA Lab - Creating a Cyber World
-
Thoughts on Kevin Mitnick interview (key points on Word)
watch interview and write down key points -
Symmetric/Asymmetric Examples.
description of each -
1st Cipher Chart from lesson practical
understand cipher
make cipher -
Google Data Centre / Security Key
watch vid
answer question