• Period: to

    cyber

    cyber
  • Mark_Quiz_1

    three detention
    types of hackers
    dealing with hackers
  • Mark_Quiz_2

    security devices
    key encryption
    technologies
  • MARK_FileHashingExercise

    changing the hashes
    crating own hashes
    types of hashes
  • Mark_Quiz_3

  • HashingAlgorithmResearch

    types of hashes
    purpose of hashes
    description of hashes
  • 1st PKA Lab - Creating a Cyber World

  • Thoughts on Kevin Mitnick interview (key points on Word)

    watch interview and write down key points
  • Symmetric/Asymmetric Examples.

    description of each
  • 1st Cipher Chart from lesson practical

    understand cipher
    make cipher
  • Google Data Centre / Security Key

    watch vid
    answer question