SOC100 Master SOC100 C21: Symmetric & Asymmetric Encryption, Hashing, TLS & More π
Join our live stream to learn everything from Windows basics to advanced SOC analyst skills, including encryption, hashing, encoding, decoding, and cryptography essentials for cybersecurity success.

Level Effect
422 views β’ Jan 14, 2025

About this video
We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400+ hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time.
Full playlist: https://youtube.com/playlist?list=PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh&si=TvuJWlDVeU0r_s99
Full course info π https://www.leveleffect.com/soc100
Stream calendar ποΈ https://docs.google.com/spreadsheets/d/12WRVm_52PmFkp6Lr8v9v8M1ONcRytOz8zizYBy10LHI/edit?gid=0#gid=0
Stream Details:
- Class 21
- Course: SOC100-2
- Domain: Cryptography
Website: https://leveleffect.com
Discord: https://discord.gg/level-effect
Twitch: https://www.twitch.tv/leveleffect
Newsletter & Blog: https://news.leveleffect.com/
LinkedIn: https://www.linkedin.com/school/leveleffect
00:00:00 - Welcome: Introductions and greetings in chat.
00:01:56 - Discussion: Dedication of students studying until late.
00:03:26 - Agenda overview: TCP, TLS handshake, encryption, and hashing.
00:04:38 - Introduction to today's labs: Hands-on encryption and hashing.
00:06:11 - Chat engagement: Student feedback on recent streams.
00:09:11 - Celebrating student achievements: SOC analyst job offer.
00:14:49 - Resume tips: How to highlight SOC100 skills.
00:18:27 - Clarifying GRC frameworks and their practical applications.
00:19:59 - Cryptography fundamentals: Key concepts and definitions.
00:20:53 - Encoding explained: Its role in data transfer integrity.
00:24:31 - Real-world analogy: Broken telephone game to illustrate data integrity.
00:25:53 - Examples of encoding: Base64, URL encoding, and their importance.
00:29:59 - Avoiding data transmission issues: Encoding special characters.
00:33:00 - Summary of encoding: Compatibility and trust in data transfer.
00:34:40 - Introduction to hashing: One-way function and its purpose.
00:35:42 - Hashing explained: Fixed-length transformation of any input.
00:37:56 - Cracked egg analogy: Demonstrating the one-way nature of hashing.
00:39:54 - Importance of hash outputs: Small representations of larger data.
00:42:02 - Ensuring data integrity: Strong hash functions and avoiding collisions.
00:43:55 - Characteristics of good hash functions: Small input changes cause significant output changes.
00:46:23 - Clarification with a book title analogy: Verifying data integrity through hashing.
00:48:56 - Discussion: Differences between hashing, encoding, and encryption.
00:54:43 - Recap: Encryption reversibility vs. the one-way nature of hashing.
01:02:29 - Practical use of hashing: Digital forensics and ensuring data authenticity.
01:05:42 - Transition to symmetric vs. asymmetric encryption: Key principles and use cases.
01:09:31 - Symmetric encryption in practice: Secure communications.
01:11:54 - Overview of TCP/TLS handshake: Establishing secure data channels.
01:18:27 - Detailed walkthrough of the handshake process.
01:26:38 - Client and server random values: Their role in secure key exchanges.
01:35:23 - Digital certificates: Establishing authenticity and trust in communications.
01:45:32 - Public and private keys: Role in ensuring confidentiality and security.
01:51:54 - Perfect forward secrecy: Protecting future data even if keys are compromised.
02:01:02 - Key derivation functions (KDFs): Creating secure session keys.
02:05:42 - Recap: Importance of understanding cryptographic processes.
02:10:13 - Student Q&A: Clarifying key concepts and addressing confusion.
02:15:30 - Real-world application of cryptography in cybersecurity roles.
02:20:54 - Review of TCP/IP layers and packet structures.
02:26:42 - Explanation of secure data transmission protocols.
02:35:12 - Advanced hashing algorithms: SHA-256 and their role in modern security.
02:40:45 - Addressing common misconceptions about encryption and hashing.
02:58:42 - Introduction to the lab: Hands-on with encryption and encoding.
02:55:30 - Practical advice: Tools for studying cryptography and improving skills.
03:01:20 - Discussion: Balancing theory and practical experience in cybersecurity.
03:04:29 - Encoding a message using Base64: Step-by-step walkthrough.
03:07:52 - Decoding the Base64 message: Verifying the integrity of the data
03:12:18 - Lab activity: Encrypting a file using symmetric AES encryption.
03:15:47 - Explanation of AES keys: Generating and using them in the lab.
03:18:34 - Decrypting the encrypted file: Validating confidentiality.
03:20:51 - Revisiting key cryptographic terms for exam preparation.
03:22:19 - Practical demonstration of hashing: Using SHA-256 to hash a file.
03:25:42 - Verifying file integrity with hash comparison: Lab results.
03:28:32 - Recap of today's session: Key takeaways and concepts.
03:35:48 - Closing Q&A: Additional clarifications and feedback from students.
03:43:21 - Final thoughts: Preparing for the next session
03:50:15 - Farewell: Encouraging words and reminders to keep practicing.
Full playlist: https://youtube.com/playlist?list=PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh&si=TvuJWlDVeU0r_s99
Full course info π https://www.leveleffect.com/soc100
Stream calendar ποΈ https://docs.google.com/spreadsheets/d/12WRVm_52PmFkp6Lr8v9v8M1ONcRytOz8zizYBy10LHI/edit?gid=0#gid=0
Stream Details:
- Class 21
- Course: SOC100-2
- Domain: Cryptography
Website: https://leveleffect.com
Discord: https://discord.gg/level-effect
Twitch: https://www.twitch.tv/leveleffect
Newsletter & Blog: https://news.leveleffect.com/
LinkedIn: https://www.linkedin.com/school/leveleffect
00:00:00 - Welcome: Introductions and greetings in chat.
00:01:56 - Discussion: Dedication of students studying until late.
00:03:26 - Agenda overview: TCP, TLS handshake, encryption, and hashing.
00:04:38 - Introduction to today's labs: Hands-on encryption and hashing.
00:06:11 - Chat engagement: Student feedback on recent streams.
00:09:11 - Celebrating student achievements: SOC analyst job offer.
00:14:49 - Resume tips: How to highlight SOC100 skills.
00:18:27 - Clarifying GRC frameworks and their practical applications.
00:19:59 - Cryptography fundamentals: Key concepts and definitions.
00:20:53 - Encoding explained: Its role in data transfer integrity.
00:24:31 - Real-world analogy: Broken telephone game to illustrate data integrity.
00:25:53 - Examples of encoding: Base64, URL encoding, and their importance.
00:29:59 - Avoiding data transmission issues: Encoding special characters.
00:33:00 - Summary of encoding: Compatibility and trust in data transfer.
00:34:40 - Introduction to hashing: One-way function and its purpose.
00:35:42 - Hashing explained: Fixed-length transformation of any input.
00:37:56 - Cracked egg analogy: Demonstrating the one-way nature of hashing.
00:39:54 - Importance of hash outputs: Small representations of larger data.
00:42:02 - Ensuring data integrity: Strong hash functions and avoiding collisions.
00:43:55 - Characteristics of good hash functions: Small input changes cause significant output changes.
00:46:23 - Clarification with a book title analogy: Verifying data integrity through hashing.
00:48:56 - Discussion: Differences between hashing, encoding, and encryption.
00:54:43 - Recap: Encryption reversibility vs. the one-way nature of hashing.
01:02:29 - Practical use of hashing: Digital forensics and ensuring data authenticity.
01:05:42 - Transition to symmetric vs. asymmetric encryption: Key principles and use cases.
01:09:31 - Symmetric encryption in practice: Secure communications.
01:11:54 - Overview of TCP/TLS handshake: Establishing secure data channels.
01:18:27 - Detailed walkthrough of the handshake process.
01:26:38 - Client and server random values: Their role in secure key exchanges.
01:35:23 - Digital certificates: Establishing authenticity and trust in communications.
01:45:32 - Public and private keys: Role in ensuring confidentiality and security.
01:51:54 - Perfect forward secrecy: Protecting future data even if keys are compromised.
02:01:02 - Key derivation functions (KDFs): Creating secure session keys.
02:05:42 - Recap: Importance of understanding cryptographic processes.
02:10:13 - Student Q&A: Clarifying key concepts and addressing confusion.
02:15:30 - Real-world application of cryptography in cybersecurity roles.
02:20:54 - Review of TCP/IP layers and packet structures.
02:26:42 - Explanation of secure data transmission protocols.
02:35:12 - Advanced hashing algorithms: SHA-256 and their role in modern security.
02:40:45 - Addressing common misconceptions about encryption and hashing.
02:58:42 - Introduction to the lab: Hands-on with encryption and encoding.
02:55:30 - Practical advice: Tools for studying cryptography and improving skills.
03:01:20 - Discussion: Balancing theory and practical experience in cybersecurity.
03:04:29 - Encoding a message using Base64: Step-by-step walkthrough.
03:07:52 - Decoding the Base64 message: Verifying the integrity of the data
03:12:18 - Lab activity: Encrypting a file using symmetric AES encryption.
03:15:47 - Explanation of AES keys: Generating and using them in the lab.
03:18:34 - Decrypting the encrypted file: Validating confidentiality.
03:20:51 - Revisiting key cryptographic terms for exam preparation.
03:22:19 - Practical demonstration of hashing: Using SHA-256 to hash a file.
03:25:42 - Verifying file integrity with hash comparison: Lab results.
03:28:32 - Recap of today's session: Key takeaways and concepts.
03:35:48 - Closing Q&A: Additional clarifications and feedback from students.
03:43:21 - Final thoughts: Preparing for the next session
03:50:15 - Farewell: Encouraging words and reminders to keep practicing.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
422
Likes
18
Duration
04:03:49
Published
Jan 14, 2025
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.