Cryptography for Cyber Security and BlockChain Bangla Tutorial #Class 01 :Course Introduction

Hey, Welcome to our New Course Cryptography for Cyber Security and BlockChain.In this course we will learn: Fundamentals 1. Introduction 2. What is Cryptogr...

InfoSec BD1.9K views1:36

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Turkey under the topic 'bursa deprem'.

About this video

Hey, Welcome to our New Course Cryptography for Cyber Security and BlockChain.In this course we will learn: Fundamentals 1. Introduction 2. What is Cryptography 3. Roles of cryptography in Communication 4. What is Cyber Security 5. Roles of Cryptography in cyber security 6. What is Blockchain 7. Why Blockchain is called a decentralized System 8. Roles of Cryptography in Blockchain Cryptography Core 9. What is Cryptography & Why it is needed 10. Cryptography Key Terms 11. Classification of Cryptography 12. Cryptanalysis 13. Classical encryption Techniques 14. Brute-Force attack 15. Crypto-Technique 1 (Caesar Cipher) 16. Crypto-Technique 2 (Monoalphabetic Cipher) 17. Crypto-Technique 3 (PlayFair Cipher) 18. Crypto-Technique 4 (Hill-Cipher) 19. Crypto-Technique 5 (Block Cipher) 20. Crypto-Technique 6 (Stream Cipher) 21. Crypto-Technique 7 (Poly-Alphabetic Cipher) 22. Crypto-Technique 8 (One Time Pad) 23. Crypto-Technique 9 (Rail-Fence Technique) 24. Crypto-Technique 10 (Row Column Transposition Technique) 25. Crypto-Technique 11 (RSA Algorithm) 26. Crypto-Technique 12 (DSA Algorithm) 27. Mastering The Hash 13 28. Classification of hash and its application 29. MD5, SHA128, SHA256, SHA512, oracle Fundamentals 30. Problem-solving using hash 31. Doubt solving according to your comments and suggestion 32. End Lecture and lots of love …. 🧨 Disclaimer 🎃 All videos and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos uploaded in CyberTeach360 Youtube Channel are only for those are interested to learn about Ethical Hacking, Security, Penetration Testing, and malware analysis. Hacking tutorials are against the misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. ✅ Follow Us 🆗 🔈Facebook: https://www.facebook.com/foysalahammad.farabi 🔊Twitter: https://twitter.com/0x_foysal 📗Github: https://github.com/cyberteach360 ✅Facebook Helping Group:https://www.facebook.com/groups/cyberbanglalive 🆓 Facebook Page Link:https://www.facebook.com/cyb3rbangla ✅Telegram Channel:https://t.me/+myMim9UxT61mNGY1 👀Telegram Group:https://t.me/+8DHIIwdT9fY5OGI1 #hacking #hack #ethicalhacking #cybersecurity #bugbounty #ctf #blockchain #crypto 😊 Thank you!!! 😊

Video Information

Views
1.9K

Total views since publication

Likes
49

User likes and reactions

Duration
1:36

Video length

Published
Jun 23, 2022

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.