Introducing Secure Sockets Layer (SSL)
Implementing PGP email security with GPG
Exploring the security of SSL with Wireshark
Small Business and Entrepreneurship
Lisa is an associate professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses she has taught during the past 13 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and VoIP and Unified Communications. She holds an MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning speaker. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.
4. Hash Algorithms, Message Digests, and Authentication
Author – Ethical Hacking: Penetration Testing
– Are you ready for your first challenge? Were going to go to the Enigma machine simulator. Your challenge will be to decrypt the message. But first Im gonna show you how it works. At the website you can see the simulator. On the top, you see the rotors. On the lower right, you see the steckers. That would represent the tiny switchboard on the image of the Enigma. Were not going to do anything with the steckers. Up on the rotors, were gonna alter them so they say F-U-N. For the input, type PASSWORD. And now, you see the output, alright. Now your challenge. Open a new session. Now youll put the same rotor selection, F-U-N. And heres your code, decrypt that code. This should take you no more than three minutes. Be sure to check back to see the solution. Good luck!
Introducing common cryptographic concepts and terminology
Unlock this course with a free trial
Looking deeper into message digests
Investigating email privacy and authentication concerns
exercise file: subscribe for access
Providing confidentiality, integrity authentication, and non-repudiation
Understanding why encryption is necessary
Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and provides a demonstration of a typical SSL transaction. By the end of this course, youll have a solid understanding of what it takes to move and store data securely.
Diving into hash algorithms and message digests
4. Hash Algorithms, Message Digests, and Authentication
Challenge: Coding with the Enigma machine
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download the exercise files for this course.Get started with a free trial today.
What you should know before watching this course
3. Asymmetric Encryption and Digital Signatures
Comparing passive and active network attacks
3. Asymmetric Encryption and Digital Signatures
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Understanding passwords, hash, salt, and rainbow tables
Solution: Coding with the Enigma machine
Overview and cryptographic requirements
Working with the Advanced Encryption Standard (AES)
Exploring Internet Protocol Security (IPsec)
Dissecting the public key algorithms: RSA and Diffie-Hellman
Dissecting block and stream ciphers
Learn the most in-demand business, tech and creative skills from industry experts.
Challenge: Coding with the Enigma machine
Since 2004, Lisa Bock has been teaching IT, everything from forensics to network security.
Practice while you learn with exercise files
From the course:Learning Cryptography and Network Security
Reviewing the history of cryptography
Watch this course anytime, anywhere.Get started with a free trial today.
Download courses and learn on the go
Creating key pairs for the Diffie-Hellman algorithm
Dissecting the authentication header
Join today to access over 5,000 courses taught by industry experts.