Free Short Course: Cryptography Module 3 🛡️ - Essential Cybersecurity Insights with Q&A
Join our free Cryptography Module 3 course to deepen your understanding of cybersecurity fundamentals. Perfect for enhancing your digital safety skills—includes interactive Q&A!

ITMastersCSU
1.1K views • Oct 7, 2021

About this video
Understanding cyber security is becoming increasingly important in our ever changing, permanently connected, digital lives. Our digital footprint is ever growing and the requirement to keep our digital identities safe and secure is becoming increasingly important as our reliance on online technologies grows.
Sign up here: https://itmasters.edu.au/short-courses/cryptography/
Welcome 0:00
Outline 2:50
Public-key cryptography & RSA 3:45
Terminology 4:04
Principles 10:35
Public-key Systems 12:37
Conventional v Public-key 17:06
Application of Public-key Systems 20:55
Public-key Requirements 26:32
Public-key Attacks 28:27
RSA Algorithm 32:15
Factoring is important to RSA 32:33
And so are Prime numbers 34:35
RSA Challenge (1991-2007) 36:51
RSA Challenge 38:09
Rivest-Shamir-Adleman Algorithm 39:14
Algorithm Requirements 42:05
Key Generation 43:01
Security of RSA 45:44
Breaking RSA 46:58
RSA by Hand 48:27
RSA Key Generation 48:47
Ready to go... 55:38
Encryption 55:51
Decryption 58:44
If we compare... 59:10
Diffie-Hellman Quick & Dirty 1:00:05
Diffie-Hellman Key Exchange 1:00:34
MiTM Attack 1:03:08
PKI in Simple Terms 1:04:43
PKI - Public Key Infrastructure 1:05:10
PKI - Explained in 5... 1:05:49
Common Challenges PKI solves... 1:11:33
Common Uses of PKI 1:12:33
Learning Tasks 1:13:31
Module 3 Activities 1:13:44
Q&A 1:16:11
Sign up here: https://itmasters.edu.au/short-courses/cryptography/
Welcome 0:00
Outline 2:50
Public-key cryptography & RSA 3:45
Terminology 4:04
Principles 10:35
Public-key Systems 12:37
Conventional v Public-key 17:06
Application of Public-key Systems 20:55
Public-key Requirements 26:32
Public-key Attacks 28:27
RSA Algorithm 32:15
Factoring is important to RSA 32:33
And so are Prime numbers 34:35
RSA Challenge (1991-2007) 36:51
RSA Challenge 38:09
Rivest-Shamir-Adleman Algorithm 39:14
Algorithm Requirements 42:05
Key Generation 43:01
Security of RSA 45:44
Breaking RSA 46:58
RSA by Hand 48:27
RSA Key Generation 48:47
Ready to go... 55:38
Encryption 55:51
Decryption 58:44
If we compare... 59:10
Diffie-Hellman Quick & Dirty 1:00:05
Diffie-Hellman Key Exchange 1:00:34
MiTM Attack 1:03:08
PKI in Simple Terms 1:04:43
PKI - Public Key Infrastructure 1:05:10
PKI - Explained in 5... 1:05:49
Common Challenges PKI solves... 1:11:33
Common Uses of PKI 1:12:33
Learning Tasks 1:13:31
Module 3 Activities 1:13:44
Q&A 1:16:11
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.1K
Likes
18
Duration
01:50:39
Published
Oct 7, 2021
User Reviews
4.5
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now