-
Mark Quiz 1
- Cybersecurity is about vulnerability on the internet.
- Quiz 1 is about hacking, vulnerability, data questions.
-
Mark Quiz 2
- Quiz 2 is about protecting data and keeping it safe
-
Mark Quiz 3
- Quiz 3 is about virus and malware.
- Threats, vulnerabilities, and attacks.
-
MARK File Hashing Exercise
- Their are many different hash types.
- It can be used to verify if data has changed.
-
Hashing Algorithm Research
- They are different lengths, numbers and letters.
- The different hash type has different bit value.
-
Symmetric/Asymmetric Examples.
- It’s a symmetric block cipher with different bit blocks.
- They have different keys.
-
Google Data Centre / Security Key
- Its about securing your google account.
- Also about protecting your data. 2-step verification.
-
Kevin Mitnick interview
- He was a hacking which got him into trouble.
- He was introduced to phone phishing when he was 11.
-
Caesar Cipher
- Its used to code.
- Its uses the alphabet and it shifts by a certain number.
-
1st PKA Lab - Creating a Cyber World.
FQDN - Fully qualified domain name -
2nd PKA Lab - FTP/Telnet/SSH Sniffer
-
3rd PKA Cyber Lab
What is the username and password for Mary’s FTP account?
user: mary password: cisco321 What is the decryption key to access the confidential information in the clientinfo.txt file?
cisco123 -
4th PKA Cyber Lab