SOC100 C21 Asymmetric & Symmetric Encryption, Hashing, Encoding, Decoding, Cryptography, TLS
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400+ hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time.
Full playlist: https://youtube.com/playlist?list=PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh&si=TvuJWlDVeU0r_s99
Full course info 👉 https://www.leveleffect.com/soc100
Stream calendar 🗓️ https://docs.google.com/spreadsheets/d/12WRVm_52PmFkp6Lr8v9v8M1ONcRytOz8zizYBy10LHI/edit?gid=0#gid=0
Stream Details:
- Class 21
- Course: SOC100-2
- Domain: Cryptography
Website: https://leveleffect.com
Discord: https://discord.gg/level-effect
Twitch: https://www.twitch.tv/leveleffect
Newsletter & Blog: https://news.leveleffect.com/
LinkedIn: https://www.linkedin.com/school/leveleffect
00:00:00 - Welcome: Introductions and greetings in chat.
00:01:56 - Discussion: Dedication of students studying until late.
00:03:26 - Agenda overview: TCP, TLS handshake, encryption, and hashing.
00:04:38 - Introduction to today's labs: Hands-on encryption and hashing.
00:06:11 - Chat engagement: Student feedback on recent streams.
00:09:11 - Celebrating student achievements: SOC analyst job offer.
00:14:49 - Resume tips: How to highlight SOC100 skills.
00:18:27 - Clarifying GRC frameworks and their practical applications.
00:19:59 - Cryptography fundamentals: Key concepts and definitions.
00:20:53 - Encoding explained: Its role in data transfer integrity.
00:24:31 - Real-world analogy: Broken telephone game to illustrate data integrity.
00:25:53 - Examples of encoding: Base64, URL encoding, and their importance.
00:29:59 - Avoiding data transmission issues: Encoding special characters.
00:33:00 - Summary of encoding: Compatibility and trust in data transfer.
00:34:40 - Introduction to hashing: One-way function and its purpose.
00:35:42 - Hashing explained: Fixed-length transformation of any input.
00:37:56 - Cracked egg analogy: Demonstrating the one-way nature of hashing.
00:39:54 - Importance of hash outputs: Small representations of larger data.
00:42:02 - Ensuring data integrity: Strong hash functions and avoiding collisions.
00:43:55 - Characteristics of good hash functions: Small input changes cause significant output changes.
00:46:23 - Clarification with a book title analogy: Verifying data integrity through hashing.
00:48:56 - Discussion: Differences between hashing, encoding, and encryption.
00:54:43 - Recap: Encryption reversibility vs. the one-way nature of hashing.
01:02:29 - Practical use of hashing: Digital forensics and ensuring data authenticity.
01:05:42 - Transition to symmetric vs. asymmetric encryption: Key principles and use cases.
01:09:31 - Symmetric encryption in practice: Secure communications.
01:11:54 - Overview of TCP/TLS handshake: Establishing secure data channels.
01:18:27 - Detailed walkthrough of the handshake process.
01:26:38 - Client and server random values: Their role in secure key exchanges.
01:35:23 - Digital certificates: Establishing authenticity and trust in communications.
01:45:32 - Public and private keys: Role in ensuring confidentiality and security.
01:51:54 - Perfect forward secrecy: Protecting future data even if keys are compromised.
02:01:02 - Key derivation functions (KDFs): Creating secure session keys.
02:05:42 - Recap: Importance of understanding cryptographic processes.
02:10:13 - Student Q&A: Clarifying key concepts and addressing confusion.
02:15:30 - Real-world application of cryptography in cybersecurity roles.
02:20:54 - Review of TCP/IP layers and packet structures.
02:26:42 - Explanation of secure data transmission protocols.
02:35:12 - Advanced hashing algorithms: SHA-256 and their role in modern security.
02:40:45 - Addressing common misconceptions about encryption and hashing.
02:58:42 - Introduction to the lab: Hands-on with encryption and encoding.
02:55:30 - Practical advice: Tools for studying cryptography and improving skills.
03:01:20 - Discussion: Balancing theory and practical experience in cybersecurity.
03:04:29 - Encoding a message using Base64: Step-by-step walkthrough.
03:07:52 - Decoding the Base64 message: Verifying the integrity of the data
03:12:18 - Lab activity: Encrypting a file using symmetric AES encryption.
03:15:47 - Explanation of AES keys: Generating and using them in the lab.
03:18:34 - Decrypting the encrypted file: Validating confidentiality.
03:20:51 - Revisiting key cryptographic terms for exam preparation.
03:22:19 - Practical demonstration of hashing: Using SHA-256 to hash a file.
03:25:42 - Verifying file integrity with hash comparison: Lab results.
03:28:32 - Recap of today's session: Key takeaways and concepts.
03:35:48 - Closing Q&A: Additional clarifications and feedback from students.
03:43:21 - Final thoughts: Preparing for the next session
03:50:15 - Farewell: Encouraging words and reminders to keep practicing.
Video Information
Views
422
Total views since publication
Likes
18
User likes and reactions
Duration
04:03:49
Video length
Published
Jan 14, 2025
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#cybersecurity #soc analyst #cybersecurity training #security analyst #infosec #windows security #network traffic analysis #port address translation #packet analysis #helpdesk #home lab #building home lab #cybersecurity lab #wireshark #kerberos #pcap #troubleshooting #vmware #vmware workstation
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.