Cryptography for Cyber Security & Blockchain | Bangla Tutorial Class 01 🔐

Kickstart your journey into cryptography with our Bangla course! Learn the fundamentals of cybersecurity and blockchain encryption in this comprehensive introduction. Perfect for beginners!

Cryptography for Cyber Security & Blockchain | Bangla Tutorial Class 01 🔐
InfoSec BD
1.9K views • Jun 23, 2022
Cryptography for Cyber Security & Blockchain | Bangla Tutorial Class 01 🔐

About this video

Hey, Welcome to our New Course Cryptography for Cyber Security and BlockChain.In this course we will learn:

Fundamentals
1. Introduction
2. What is Cryptography
3. Roles of cryptography in Communication
4. What is Cyber Security
5. Roles of Cryptography in cyber security
6. What is Blockchain
7. Why Blockchain is called a decentralized System
8. Roles of Cryptography in Blockchain

Cryptography Core

9. What is Cryptography & Why it is needed
10. Cryptography Key Terms
11. Classification of Cryptography
12. Cryptanalysis
13. Classical encryption Techniques
14. Brute-Force attack
15. Crypto-Technique 1 (Caesar Cipher)
16. Crypto-Technique 2 (Monoalphabetic Cipher)
17. Crypto-Technique 3 (PlayFair Cipher)
18. Crypto-Technique 4 (Hill-Cipher)
19. Crypto-Technique 5 (Block Cipher)
20. Crypto-Technique 6 (Stream Cipher)
21. Crypto-Technique 7 (Poly-Alphabetic Cipher)
22. Crypto-Technique 8 (One Time Pad)
23. Crypto-Technique 9 (Rail-Fence Technique)
24. Crypto-Technique 10 (Row Column Transposition Technique)
25. Crypto-Technique 11 (RSA Algorithm)
26. Crypto-Technique 12 (DSA Algorithm)
27. Mastering The Hash 13
28. Classification of hash and its application
29. MD5, SHA128, SHA256, SHA512, oracle Fundamentals
30. Problem-solving using hash
31. Doubt solving according to your comments and suggestion
32. End Lecture and lots of love ….

🧨 Disclaimer 🎃
All videos and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos uploaded in CyberTeach360 Youtube Channel are only for those are interested to learn about Ethical Hacking, Security, Penetration Testing, and malware analysis. Hacking tutorials are against the misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.

✅ Follow Us 🆗

🔈Facebook: https://www.facebook.com/foysalahammad.farabi

🔊Twitter: https://twitter.com/0x_foysal

📗Github: https://github.com/cyberteach360

✅Facebook Helping Group:https://www.facebook.com/groups/cyberbanglalive

🆓 Facebook Page Link:https://www.facebook.com/cyb3rbangla

✅Telegram Channel:https://t.me/+myMim9UxT61mNGY1
👀Telegram Group:https://t.me/+8DHIIwdT9fY5OGI1

#hacking #hack #ethicalhacking #cybersecurity #bugbounty #ctf #blockchain #crypto
😊 Thank you!!! 😊

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

1.9K

Likes

49

Duration

1:36

Published

Jun 23, 2022

User Reviews

4.5
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.

Trending Now