CISSP Lecture 19 Security Engineering (Cryptography Part 1)
Free CISSP Certified Information system security professional Lectures from Urdu IT academy http://urduitacademy.com http://urduitacademy.blogspot.com #urd...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in South Korea under the topic 'cybersecurity news today'.
About this video
Free CISSP Certified Information system security professional Lectures from Urdu IT academy
http://urduitacademy.com
http://urduitacademy.blogspot.com
#urduitacademy #CISSP
TABLE OF CONTENT
00:02:02 Cryptographic System.
00:03:15 Hash Function.
00:07:37 Digital Signature / Asymmetric.
00:12:28 More Terms of Crypto.
00:14:58 Some More Terms of Crypto.
00:16:23 Lastly More Terms.
00:18:13 Method of Cryptography : Stream Based Cipher.
00:22:50 Randomness.
00:24:37 Method of Cryptography : Block Cipher
00:26:10 Initializing Vector (IV).
00:27:31 Modes of Operations.
00:36:06 Key Length.
00:37:24 Null Cipher
00:38:10 Substitution Cipher
00:40:07 Playfair Cipher
00:43:51 The Rail Fence.
00:44:08 Monoalphabetic and Polyalphabetic Cipher
00:44:22 Blas de Vigenere.
00:48:06 Prime Number Magic.
00:52:47 Modular Mathematics and The Running Key Cipher.
00:55:04 One Time Pad.
00:57:37 Symmetric Cryptography.
Video Information
Views
8.2K
Total views since publication
Likes
48
User likes and reactions
Duration
01:00:00
Video length
Published
May 22, 2016
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Cryptography #Hash function #CBC #EBC #DES #Stream Cipher #Block Cipher #Fairplay Cipher #Digital Signature #Server Based Security #Datawarehouse #Data Mining #Databse Security #OWASP #Web Security #Substitution ciphet #Vulnerability #Vulnerabilities of Security architecture #Emanations #state Attack #Covert Channels #client based vulnerability #CISSP #ISO27001 #ISO27002 #COBIT #PCI #Product evaluation Model #ITSEC #TCSEC #ESA #CISSP HINDI #CISSP URDU #ITIL #TOGAF #FREE CISSP
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.