-
Period: to
Cyber
Cyber -
Mark_Quiz_1
Types of hackers
Dealing with hacker
Three dimensions -
Mark_Quiz_2
Security devices
Key encryption
Technologies -
Mark_Quiz_3
-
MARK_FileHashingExercise
Types of hashes
Creating own hashes
Changing the hashes -
HashingAlgorithmResearch
Types of hashing algorithms
Purpose of hashes
Description of hashes -
Thoughts on Kevin Mitnick interview (key points on Word)
Watching the interview
Summary
Thoughts -
Symmetric/Asymmetric Examples.
Description of each
Compare
Examples -
1st Cipher Chart from lesson practical
Understand the cipher
Create the table
Create own cipher -
Google Data Centre / Security Key
Watch the videos Answer the questions -
1st PKA Lab - Creating a Cyber World