Cyber

By 2002539
  • Period: to

    Cyber

    Cyber
  • Mark_Quiz_1

    Types of hackers
    Dealing with hacker
    Three dimensions
  • Mark_Quiz_2

    Security devices
    Key encryption
    Technologies
  • Mark_Quiz_3

  • MARK_FileHashingExercise

    Types of hashes
    Creating own hashes
    Changing the hashes
  • HashingAlgorithmResearch

    Types of hashing algorithms
    Purpose of hashes
    Description of hashes
  • Thoughts on Kevin Mitnick interview (key points on Word)

    Watching the interview
    Summary
    Thoughts
  • Symmetric/Asymmetric Examples.

    Description of each
    Compare
    Examples
  • 1st Cipher Chart from lesson practical

    Understand the cipher
    Create the table
    Create own cipher
  • Google Data Centre / Security Key

    Watch the videos Answer the questions
  • 1st PKA Lab - Creating a Cyber World