Сообщение

[O'Reilly Media / Infinite Skills / Brian Sletten] Encryption Training Video [2016, ENG]

Сообщение Солнышко » 26 фев 2017, 14:20

Encryption Training Video

Год выпуска: 06/2016
Производитель: O'Reilly Media / Infinite Skills
Сайт производителя: oreilly.com, infiniteskills.com/training/encryption.html
Автор: Brian Sletten
Продолжительность: 7:15
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: Software developers world-wide place a great deal of trust in the encryption technologies used to protect privacy and sensitive data. What could go wrong? Plenty, says security and encryption expert Brian Sletten in this wide ranging overview of the history, methods, technologies, goals, and perhaps most importantly, limitations of encryption. The video offers a high level discussion of the theories behind encryption as well as a lower level detailed explanation of the technologies and methods used in encryption today.- Receive a comprehensive overview of the history, methods, technologies, goals, and limitations of encryption
- Learn to make practical reasoned choices regarding the forms of encryption to avoid and the forms to deploy
- Explore stream ciphers, block ciphers, authenticated encryption systems, and symmetric key encryption
- Discover why the widely used MD-5 hashing algorithm should no longer be used for most encryption purposes
- Familiarize yourself with Transport Level Security (TLS), the most widely-used Internet encryption mechanism
- Learn to deploy DHKE, the asymmetric key exchange protocol for establishing encrypted Internet channels
- Understand RSA, the encryption features it enables, and why it's the standard for digitally-signing electronic documents
- Learn to recognize encryption attacks and why government demands for backdoors might cripple modern cryptography
01. Introduction
0101 Introduction to Video Series
0102 In the News
0103 Encoding vs Encryption
0104 Introduction to Hashing Algorithms
0105 Attacking Encryption With Brute Force
0106 Protecting Data At Rest vs In Transit
0107 The Encryption Key Exchange Problem
0108 Problems With Encryption Implementations
0109 The Importance of Random Number Generation and Entropy to Encryption

02. History
0201 Historical Substitution Ciphers
0202 Historical Transposition Ciphers
0203 The Historical Playfair Cipher
0204 Encryption During World War II
0205 Encryption After World War II

03. Stream Ciphers
0301 Overview of Stream Ciphers
0302 Details About the A5/1 Stream Cipher
0303 Details About the RC4 Stream Cipher
0304 Details About the Salsa20/ChaCha20 Stream Ciphers

04. Block Ciphers
0401 Overview of Block Ciphers
0402 What's Good and Bad With the Electronic Cookbook (ECB) Mode
0403 Improving Things With the Cipher Block Chaining (CBC) Mode
0404 Turning Block Ciphers Into Stream Ciphers With the Output Feedback (OFB) Mode
0405 Details About the Cipher Feedback (CFB) Mode
0406 What's Great About the Counter (CTR) Mode

05. Hashing Algorithms
0501 When Good Hashing Algorithms Go Bad

06. Authenticated Encryption
0601 Overview of Authenticated Encryption Systems

07. Symmetric Key Encryption
0701 Overview of Symmetric Key Encryption
0702 The Fascinating History of DES
0703 The Mechanics of DES
0704 How DES Was Cracked
0705 The Pleasing History of AES
0706 The Mechanics of AES
0707 Making AES Faster With Hardware Acceleration

08. Key Exchange
0801 The Fascinating History of Diffie-Hellman Key Exchange (DHKE)
0802 Mechanics of DHKE
0803 The History of RSA

09. Digital Signature
0901 Signing Documents with RSA

10. Elliptical Curves
1001 Overview of Elliptical Curve Cryptography (ECC)

11. TLS
1101 Overview of Transport Level Security (TLS)
1102 Setting Up Sessions with the TLS Handshake
1103 Picking Good TLS Ciphersuites
1104 Using OpenSSL
1105 Using Keybase.io

12. Encryption Technologies
1201 Using JSSE
1202 Encrypting Filesystems With DM-Crypt

13. Modern TLS Configuration
1301 Avoiding TLS Downgrades with HSTS
1302 Benefits of Certificate Pinning
1303 Benefits of OCSP Stapling
1304 The FREAK Attack

14. Next Steps
1401 Encouraging The Use of Encryption With Let's Encrypt
1402 The Impact of Quantum Computing on Encryption
1403 What to Expect From The Government and Encryption Laws
1404 Next Steps
Файлы примеров: не предусмотрены
Формат видео: MP4
Видео: AVC, 1280x720, 16:9, 29.97fps
Аудио: AAC, 48kHz, 125kbps, stereo



Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 14:20
Размер: 1.93 ГБ
Размер: 2 067 766 336 байт
Сидеров: 0
Личеров: 0
Скачали: 0
Здоровье: 0%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: Нет
Последний личер: Нет
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 24.62 КБ / Просмотров 2 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность