Filename | Size |
| 1.Introduction/01.Welcome.en.srt | 2.3 KB |
| 1.Introduction/01.Welcome.mp4 | 3.9 MB |
| 2.1. Encryption/02.Understanding encryption.en.srt | 5.2 KB |
| 2.1. Encryption/02.Understanding encryption.mp4 | 4.9 MB |
| 2.1. Encryption/03.Symmetric and asymmetric cryptography.en.srt | 8.4 KB |
| 2.1. Encryption/03.Symmetric and asymmetric cryptography.mp4 | 8.5 MB |
| 2.1. Encryption/04.Goals of cryptography.en.srt | 7 KB |
| 2.1. Encryption/04.Goals of cryptography.mp4 | 5.5 MB |
| 2.1. Encryption/05.Codes and ciphers.en.srt | 5.6 KB |
| 2.1. Encryption/05.Codes and ciphers.mp4 | 5.9 MB |
| 2.1. Encryption/06.Choosing encryption algorithms.en.srt | 6.6 KB |
| 2.1. Encryption/06.Choosing encryption algorithms.mp4 | 7.9 MB |
| 2.1. Encryption/07.The perfect encryption algorithm.en.srt | 5.8 KB |
| 2.1. Encryption/07.The perfect encryption algorithm.mp4 | 5.6 MB |
| 2.1. Encryption/08.The cryptographic lifecycle.en.srt | 4.9 KB |
| 2.1. Encryption/08.The cryptographic lifecycle.mp4 | 5.6 MB |
| 3.2. Symmetric Cryptography/09.Data Encryption Standard.en.srt | 5 KB |
| 3.2. Symmetric Cryptography/09.Data Encryption Standard.mp4 | 5.5 MB |
| 3.2. Symmetric Cryptography/10.3DES.en.srt | 5.2 KB |
| 3.2. Symmetric Cryptography/10.3DES.mp4 | 5.5 MB |
| 3.2. Symmetric Cryptography/11.AES, Blowfish, and Twofish.en.srt | 10.1 KB |
| 3.2. Symmetric Cryptography/11.AES, Blowfish, and Twofish.mp4 | 10.5 MB |
| 3.2. Symmetric Cryptography/12.RC4.en.srt | 3.8 KB |
| 3.2. Symmetric Cryptography/12.RC4.mp4 | 3.3 MB |
| 3.2. Symmetric Cryptography/13.Steganography.en.srt | 8.4 KB |
| 3.2. Symmetric Cryptography/13.Steganography.mp4 | 11.2 MB |
| 4.3. Asymmetric Cryptography/14.Rivest-Shamir-Adleman (RSA).en.srt | 5.1 KB |
| 4.3. Asymmetric Cryptography/14.Rivest-Shamir-Adleman (RSA).mp4 | 5.4 MB |
| 4.3. Asymmetric Cryptography/15.PGP and GnuPG.en.srt | 17.5 KB |
| 4.3. Asymmetric Cryptography/15.PGP and GnuPG.mp4 | 23.9 MB |
| 4.3. Asymmetric Cryptography/16.Elliptic curve and quantum cryptography.en.srt | 5.4 KB |
| 4.3. Asymmetric Cryptography/16.Elliptic curve and quantum cryptography.mp4 | 5.2 MB |
| 5.4. Key Management/17.Cryptographic key security.en.srt | 4.7 KB |
| 5.4. Key Management/17.Cryptographic key security.mp4 | 3.5 MB |
| 5.4. Key Management/18.Key exchange.en.srt | 5.5 KB |
| 5.4. Key Management/18.Key exchange.mp4 | 4.2 MB |
| 5.4. Key Management/19.Diffie-Hellman.en.srt | 9 KB |
| 5.4. Key Management/19.Diffie-Hellman.mp4 | 8.6 MB |
| 5.4. Key Management/20.Key escrow.en.srt | 6 KB |
| 5.4. Key Management/20.Key escrow.mp4 | 8.6 MB |
| 5.4. Key Management/21.Key stretching.en.srt | 3.2 KB |
| 5.4. Key Management/21.Key stretching.mp4 | 2.7 MB |
| 6.5. Public Key Infrastructure/22.Trust models.en.srt | 5.4 KB |
| 6.5. Public Key Infrastructure/22.Trust models.mp4 | 4.4 MB |
| 6.5. Public Key Infrastructure/23.PKI and digital certificates.en.srt | 7.8 KB |
| 6.5. Public Key Infrastructure/23.PKI and digital certificates.mp4 | 8.9 MB |
| 6.5. Public Key Infrastructure/24.Hash functions.en.srt | 14.7 KB |
| 6.5. Public Key Infrastructure/24.Hash functions.mp4 | 15 MB |
| 6.5. Public Key Infrastructure/25.Digital signatures.en.srt | 7 KB |
| 6.5. Public Key Infrastructure/25.Digital signatures.mp4 | 6 MB |
| 6.5. Public Key Infrastructure/26.Create a digital certificate.en.srt | 8.1 KB |
| 6.5. Public Key Infrastructure/26.Create a digital certificate.mp4 | 9 MB |
| 6.5. Public Key Infrastructure/27.Revoke a digital certificate.en.srt | 3.4 KB |
| 6.5. Public Key Infrastructure/27.Revoke a digital certificate.mp4 | 2.5 MB |
| 6.5. Public Key Infrastructure/28.Certificate stapling.en.srt | 4.6 KB |
| 6.5. Public Key Infrastructure/28.Certificate stapling.mp4 | 4.5 MB |
| 7.6. Transport Encryption/29.TLS and SSL.en.srt | 6.6 KB |
| 7.6. Transport Encryption/29.TLS and SSL.mp4 | 7.2 MB |
| 7.6. Transport Encryption/30.IPsec.en.srt | 4.7 KB |
| 7.6. Transport Encryption/30.IPsec.mp4 | 4.1 MB |
| 7.6. Transport Encryption/31.Securing common protocols.en.srt | 10.8 KB |
| 7.6. Transport Encryption/31.Securing common protocols.mp4 | 18.5 MB |
| 7.6. Transport Encryption/32.DKIM.en.srt | 4.1 KB |
| 7.6. Transport Encryption/32.DKIM.mp4 | 6.9 MB |
| 7.6. Transport Encryption/33.Tor and perfect forward secrecy.en.srt | 13.4 KB |
| 7.6. Transport Encryption/33.Tor and perfect forward secrecy.mp4 | 13.4 MB |
| 8.7. Cryptanalytic Attacks/34.Brute force attacks.en.srt | 5.2 KB |
| 8.7. Cryptanalytic Attacks/34.Brute force attacks.mp4 | 4.6 MB |
| 8.7. Cryptanalytic Attacks/35.Knowledge-based attacks.en.srt | 3.5 KB |
| 8.7. Cryptanalytic Attacks/35.Knowledge-based attacks.mp4 | 4 MB |
| 9.Conclusion/36.What's next.en.srt | 1.1 KB |
| 9.Conclusion/36.What's next.mp4 | 1.6 MB |