SOC100 Master SOC100 C21: Symmetric & Asymmetric Encryption, Hashing, TLS & More πŸ”

Join our live stream to learn everything from Windows basics to advanced SOC analyst skills, including encryption, hashing, encoding, decoding, and cryptography essentials for cybersecurity success.

SOC100 Master SOC100 C21: Symmetric & Asymmetric Encryption, Hashing, TLS & More πŸ”
Level Effect
422 views β€’ Jan 14, 2025
SOC100 Master SOC100 C21: Symmetric & Asymmetric Encryption, Hashing, TLS & More πŸ”

About this video

We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400+ hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time.

Full playlist: https://youtube.com/playlist?list=PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh&si=TvuJWlDVeU0r_s99

Full course info πŸ‘‰ https://www.leveleffect.com/soc100
Stream calendar πŸ—“οΈ https://docs.google.com/spreadsheets/d/12WRVm_52PmFkp6Lr8v9v8M1ONcRytOz8zizYBy10LHI/edit?gid=0#gid=0

Stream Details:
- Class 21
- Course: SOC100-2
- Domain: Cryptography

Website: https://leveleffect.com
Discord: https://discord.gg/level-effect
Twitch: https://www.twitch.tv/leveleffect
Newsletter & Blog: https://news.leveleffect.com/
LinkedIn: https://www.linkedin.com/school/leveleffect

00:00:00 - Welcome: Introductions and greetings in chat.
00:01:56 - Discussion: Dedication of students studying until late.
00:03:26 - Agenda overview: TCP, TLS handshake, encryption, and hashing.
00:04:38 - Introduction to today's labs: Hands-on encryption and hashing.
00:06:11 - Chat engagement: Student feedback on recent streams.
00:09:11 - Celebrating student achievements: SOC analyst job offer.
00:14:49 - Resume tips: How to highlight SOC100 skills.
00:18:27 - Clarifying GRC frameworks and their practical applications.
00:19:59 - Cryptography fundamentals: Key concepts and definitions.
00:20:53 - Encoding explained: Its role in data transfer integrity.
00:24:31 - Real-world analogy: Broken telephone game to illustrate data integrity.
00:25:53 - Examples of encoding: Base64, URL encoding, and their importance.
00:29:59 - Avoiding data transmission issues: Encoding special characters.
00:33:00 - Summary of encoding: Compatibility and trust in data transfer.
00:34:40 - Introduction to hashing: One-way function and its purpose.
00:35:42 - Hashing explained: Fixed-length transformation of any input.
00:37:56 - Cracked egg analogy: Demonstrating the one-way nature of hashing.
00:39:54 - Importance of hash outputs: Small representations of larger data.
00:42:02 - Ensuring data integrity: Strong hash functions and avoiding collisions.
00:43:55 - Characteristics of good hash functions: Small input changes cause significant output changes.
00:46:23 - Clarification with a book title analogy: Verifying data integrity through hashing.
00:48:56 - Discussion: Differences between hashing, encoding, and encryption.
00:54:43 - Recap: Encryption reversibility vs. the one-way nature of hashing.
01:02:29 - Practical use of hashing: Digital forensics and ensuring data authenticity.
01:05:42 - Transition to symmetric vs. asymmetric encryption: Key principles and use cases.
01:09:31 - Symmetric encryption in practice: Secure communications.
01:11:54 - Overview of TCP/TLS handshake: Establishing secure data channels.
01:18:27 - Detailed walkthrough of the handshake process.
01:26:38 - Client and server random values: Their role in secure key exchanges.
01:35:23 - Digital certificates: Establishing authenticity and trust in communications.
01:45:32 - Public and private keys: Role in ensuring confidentiality and security.
01:51:54 - Perfect forward secrecy: Protecting future data even if keys are compromised.
02:01:02 - Key derivation functions (KDFs): Creating secure session keys.
02:05:42 - Recap: Importance of understanding cryptographic processes.
02:10:13 - Student Q&A: Clarifying key concepts and addressing confusion.
02:15:30 - Real-world application of cryptography in cybersecurity roles.
02:20:54 - Review of TCP/IP layers and packet structures.
02:26:42 - Explanation of secure data transmission protocols.
02:35:12 - Advanced hashing algorithms: SHA-256 and their role in modern security.
02:40:45 - Addressing common misconceptions about encryption and hashing.
02:58:42 - Introduction to the lab: Hands-on with encryption and encoding.
02:55:30 - Practical advice: Tools for studying cryptography and improving skills.
03:01:20 - Discussion: Balancing theory and practical experience in cybersecurity.
03:04:29 - Encoding a message using Base64: Step-by-step walkthrough.
03:07:52 - Decoding the Base64 message: Verifying the integrity of the data
03:12:18 - Lab activity: Encrypting a file using symmetric AES encryption.
03:15:47 - Explanation of AES keys: Generating and using them in the lab.
03:18:34 - Decrypting the encrypted file: Validating confidentiality.
03:20:51 - Revisiting key cryptographic terms for exam preparation.
03:22:19 - Practical demonstration of hashing: Using SHA-256 to hash a file.
03:25:42 - Verifying file integrity with hash comparison: Lab results.
03:28:32 - Recap of today's session: Key takeaways and concepts.
03:35:48 - Closing Q&A: Additional clarifications and feedback from students.
03:43:21 - Final thoughts: Preparing for the next session
03:50:15 - Farewell: Encouraging words and reminders to keep practicing.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

422

Likes

18

Duration

04:03:49

Published

Jan 14, 2025

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.