Cryptography for Cyber Security and BlockChain Bangla Tutorial #Class 01 :Course Introduction
Hey, Welcome to our New Course Cryptography for Cyber Security and BlockChain.In this course we will learn: Fundamentals 1. Introduction 2. What is Cryptogr...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Turkey under the topic 'bursa deprem'.
About this video
Hey, Welcome to our New Course Cryptography for Cyber Security and BlockChain.In this course we will learn:
Fundamentals
1. Introduction
2. What is Cryptography
3. Roles of cryptography in Communication
4. What is Cyber Security
5. Roles of Cryptography in cyber security
6. What is Blockchain
7. Why Blockchain is called a decentralized System
8. Roles of Cryptography in Blockchain
Cryptography Core
9. What is Cryptography & Why it is needed
10. Cryptography Key Terms
11. Classification of Cryptography
12. Cryptanalysis
13. Classical encryption Techniques
14. Brute-Force attack
15. Crypto-Technique 1 (Caesar Cipher)
16. Crypto-Technique 2 (Monoalphabetic Cipher)
17. Crypto-Technique 3 (PlayFair Cipher)
18. Crypto-Technique 4 (Hill-Cipher)
19. Crypto-Technique 5 (Block Cipher)
20. Crypto-Technique 6 (Stream Cipher)
21. Crypto-Technique 7 (Poly-Alphabetic Cipher)
22. Crypto-Technique 8 (One Time Pad)
23. Crypto-Technique 9 (Rail-Fence Technique)
24. Crypto-Technique 10 (Row Column Transposition Technique)
25. Crypto-Technique 11 (RSA Algorithm)
26. Crypto-Technique 12 (DSA Algorithm)
27. Mastering The Hash 13
28. Classification of hash and its application
29. MD5, SHA128, SHA256, SHA512, oracle Fundamentals
30. Problem-solving using hash
31. Doubt solving according to your comments and suggestion
32. End Lecture and lots of love ….
🧨 Disclaimer 🎃
All videos and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos uploaded in CyberTeach360 Youtube Channel are only for those are interested to learn about Ethical Hacking, Security, Penetration Testing, and malware analysis. Hacking tutorials are against the misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.
✅ Follow Us 🆗
🔈Facebook: https://www.facebook.com/foysalahammad.farabi
🔊Twitter: https://twitter.com/0x_foysal
📗Github: https://github.com/cyberteach360
✅Facebook Helping Group:https://www.facebook.com/groups/cyberbanglalive
🆓 Facebook Page Link:https://www.facebook.com/cyb3rbangla
✅Telegram Channel:https://t.me/+myMim9UxT61mNGY1
👀Telegram Group:https://t.me/+8DHIIwdT9fY5OGI1
#hacking #hack #ethicalhacking #cybersecurity #bugbounty #ctf #blockchain #crypto
😊 Thank you!!! 😊
Video Information
Views
1.9K
Total views since publication
Likes
49
User likes and reactions
Duration
1:36
Video length
Published
Jun 23, 2022
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#cyber tech 360 #ethical hacking bangla videos #hacking bangla videos #bug bounty in bangla #cyber security in bangla #ctf in bangla #web hacking in bangla #network hacking in bangla #hacking bangla tutorial #cryptography #crypto #cryptography bangla course #cryptography for security bangla course
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.