Free Short Course: Cryptography Module 2 + Q&A β Boost Your Cybersecurity Skills π
Enhance your understanding of cryptography and cybersecurity with our free short course. Dive into Module 2 and get your questions answered to stay protected in our digital world!

ITMastersCSU
1.6K views β’ Sep 30, 2021

About this video
Understanding cyber security is becoming increasingly important in our ever changing, permanently connected, digital lives. Our digital footprint is ever growing and the requirement to keep our digital identities safe and secure is becoming increasingly important as our reliance on online technologies grows.
Sign up here: https://itmasters.edu.au/short-courses/cryptography/
Welcome 0:00
Outline 3:39
Classic Encryption 5:04
Definitions 5:21
Symmetric Encryption 8:04
Simplified Cryptosystem 12:20
Characterisation 13:26
Cryptanalysis & Brute-force Attacks 15:16
Types of Attacks on Encrypted Messages 19:27
Encryption Scheme Security 21:31
Brute-Force Attack 23:21
Substitution Techniques 23:52
Caesar Cipher 25:53
Brute-Forcing Caesar 35:20
Monoalphabetic Ciphers 36:48
Playfair Cipher 39:39
Security of Playfair Cipher 44:26
Playfair Cipher 45:54
Polyalphabetic Ciphers 46:48
Vignere Ciphers 47:18
Vignere Cipher Example 48:14
Transposition Ciphers 53:14
Rail Fence Cipher 53:46
Block & Stream Ciphers 57:29
Stream Ciphers 57:38
Block Ciphers 1:00:15
Stream V Block 1:01:26
Data Encryption Standard (DES) 1:03:45
Average Time to Break 1:05:35
Strength of DES 1:08:51
Advanced Encryption Standard (AES) 1:10:31
Detailed Structure 1:13:20
Learning Tasks 1:16:57
Study with IT Masters and CSU (skip to Q&A for remainder of short course content) 1:19:49
Q&A 1:33:25
Sign up here: https://itmasters.edu.au/short-courses/cryptography/
Welcome 0:00
Outline 3:39
Classic Encryption 5:04
Definitions 5:21
Symmetric Encryption 8:04
Simplified Cryptosystem 12:20
Characterisation 13:26
Cryptanalysis & Brute-force Attacks 15:16
Types of Attacks on Encrypted Messages 19:27
Encryption Scheme Security 21:31
Brute-Force Attack 23:21
Substitution Techniques 23:52
Caesar Cipher 25:53
Brute-Forcing Caesar 35:20
Monoalphabetic Ciphers 36:48
Playfair Cipher 39:39
Security of Playfair Cipher 44:26
Playfair Cipher 45:54
Polyalphabetic Ciphers 46:48
Vignere Ciphers 47:18
Vignere Cipher Example 48:14
Transposition Ciphers 53:14
Rail Fence Cipher 53:46
Block & Stream Ciphers 57:29
Stream Ciphers 57:38
Block Ciphers 1:00:15
Stream V Block 1:01:26
Data Encryption Standard (DES) 1:03:45
Average Time to Break 1:05:35
Strength of DES 1:08:51
Advanced Encryption Standard (AES) 1:10:31
Detailed Structure 1:13:20
Learning Tasks 1:16:57
Study with IT Masters and CSU (skip to Q&A for remainder of short course content) 1:19:49
Q&A 1:33:25
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.6K
Likes
23
Duration
01:54:15
Published
Sep 30, 2021
User Reviews
4.4
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now