Cryptography and Cybersecurity Fundamentals

Cryptography and Cybersecurity Fundamentals

Satish C J via YouTube Direct link

Introduction to Hash Functions and Application of Hash Functions in Cryptography - CSE4003

33 of 89

33 of 89

Introduction to Hash Functions and Application of Hash Functions in Cryptography - CSE4003

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cryptography and Cybersecurity Fundamentals

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Mathematics Basics - Cryptography - Cybersecurity - CSE4003
  2. 2 Modular Arithmetic - Congruence and its Properties - Cryptography - Cybersecurity - CSE4003
  3. 3 Finding mod of a Negative Number -- Cyber Security CSE4003
  4. 4 Modular Exponentiation - Cryptography - Cyber Security - CSE4003
  5. 5 Euclidean Algorithm for Finding GCD - Cryptography - Cyber Security - CSE4003
  6. 6 Extended Euclidean Algorithm - Cryptography - Cyber Security - CSE4003
  7. 7 Modular Multiplicative Inverse - Cryptography - Cyber Security - CSE4003
  8. 8 Chinese Remainder Theorem - Cryptography - Cyber Security CSE4003
  9. 9 Primality Testing - Fermat's little Theorem - Carmichael Numbers - Cyber Security CSE4003
  10. 10 Miller Rabin Primality Test with Examples - Cyber Security - CSE4003
  11. 11 Euler's Totient Function and Euler's Theorem - Cryptography - Cyber Security - CSE4003
  12. 12 Introduction to Cryptography - Cyber Security - CSE4003
  13. 13 Cryptography Basics - Bitwise XOR , Shift , Circular Shift Operations - Cyber Security - CSE4003
  14. 14 Block Cipher Vs Stream Cipher - Cryptography - Cyber Security - CSE4003
  15. 15 Block Cipher Modes - Cryptography - Cyber Security - CSE4003
  16. 16 Data Encryption Standard (DES) - Explained with an Example - Cryptography - CyberSecurity - CSE4003
  17. 17 Double DES and Triple DES - Meet in the Middle Attack - Cyber Security - CSE4003
  18. 18 Caeser Cipher and Multiplicative Cipher - Cryptography - Cyber Security CSE4003
  19. 19 Playfair Cipher - Explained with an Example - Cryptography - Cyber Security CSE4003
  20. 20 Vigenere Cipher - Explained with an Example - Cryptography - Cyber Security - CSE4003
  21. 21 Hill Cipher - Encryption and Decryption - Step by Step - Cryptography - Cyber Security - CSE4003
  22. 22 AES I - Group, Ring, Field and Finite Field - Abstract Algebra Basics - Cyber Security - CSE4003
  23. 23 AES II - Finite Field ( Galois Field ) Arithmetic for Advanced Encryption Standard - CSE4003
  24. 24 AES III - Advanced Encryption Standard - Introduction , Key Expansion in AES Cyber Security CSE4003
  25. 25 AES IV - Advanced Encryption Standard - Encryption and Decryption - Cyber Security CSE4003
  26. 26 Discrete Logarithm -Finding Primitive Roots - Cryptography - CSE4003
  27. 27 Diffie Hellman Key Exchange Algorithm - Cryptography - Cyber Security - CSE4003
  28. 28 Public key Cryptography - What is it? - Cryptography - Cyber Security - CSE4003
  29. 29 Elgamal Cryptosystem - Public key Cryptography - Cyber Security - CSE4003
  30. 30 RSA Algorithm - Explained with Examples - Cyber Security - CSE4003
  31. 31 Elliptic Curve Cryptography - Session 1 - Cyber Security CSE4003
  32. 32 Elliptic Curve Cryptography - Session 2 - Cyber Security - CSE4003
  33. 33 Introduction to Hash Functions and Application of Hash Functions in Cryptography - CSE4003
  34. 34 SHA 512 - Secure Hash Algorithm - Step by Step Explanation - Cryptography - Cyber Security - CSE4003
  35. 35 Message Authentication Code (MAC) and HMAC - Cryptography - Cyber Security CSE4003
  36. 36 What are Digital Signatures ? - Cryptography - Cyber Security - CSE4003
  37. 37 Elgamal Digital Signature - Cryptography - Cyber Security - CSE4003
  38. 38 Digital Signature Standard (DSS) - Cryptography - Cyber Security - CSE4003
  39. 39 What is a Cyber Crime ? Cyber Laws in India - IT ACT 2000 - Cybersecurity CSE4003
  40. 40 Setting up a Virtual Hacking Lab - Step by Step - Cyber Security - CSE4003
  41. 41 Metasploitable 2 - Installation on VirtualBox 6.1 - Cyber Security #8
  42. 42 How to install Oracle VM Virtualbox 7.0 on Windows
  43. 43 How to install Kali Linux 2024 on Virtualbox 7.0? [Windows host]
  44. 44 NMAP demo using Kali Linux 2020 - Ethical Hacking - Cyber Security #6
  45. 45 Manual SQL Injection Demo using DVWA - Ethical Hacking - Cyber Security #7
  46. 46 Sqlmap demo Using Kali Linux 2020 - SQL Injection using SQLMAP - Ethical Hacking Cyber Security #9
  47. 47 SNORT Demo - Network Intrusion Detection and Prevention System - Kali Linux - Cyber Security #10
  48. 48 Social Engineering - What is it ? Types of Social Engineering Attacks - How to Avoid them - CSE4003
  49. 49 Social Engineering Attack Demo - Kali Linux setoolkit - Cybersecurity - CSE4003
  50. 50 Social Engineering Attack - Kali Linux - Mass Mailer - demo
  51. 51 Password Cracking Tools - Introduction and Types - Online and Offline Password Cracking - CSE4003
  52. 52 Hydra Password Cracking Tool - Demo using Kali Linux - Cybersecurity - CSE4003
  53. 53 Hydra / Hydra Graphical Password Cracking Tool Demo
  54. 54 How to use Hashcat Password Cracking Tool ? - Demo using Kali Linux - Cybersecurity - CSE4003
  55. 55 Password Cracking with John the Ripper : Single, Wordlist, and Incremental Mode Deep Dive
  56. 56 Password Recovery using Ophcrack - Kali Linux - Demo
  57. 57 Metasploit Framework - Introduction - Modules in Metasploit
  58. 58 Metasploit Framework Session 2 - Demo - Exploiting VSFTPD 2.3.4 Service
  59. 59 Metasploit Auxiliary modules Demo - TCP Port Scanners, ftp_login, ssh_version and ssh_login
  60. 60 Ethical Hacking: Using Metasploit to Crack Passwords
  61. 61 Hping3 Demo- Kali Linux - Ping Flood and SYN Flood Attack - DOS and DDOS - Explained - CSE4003
  62. 62 Nikto Web Vulnerability Scanner - Web Penetration Testing
  63. 63 Clickjacking Attack - Demo - Web Application Attack
  64. 64 Persistent XSS (Cross Site Scripting) attack - What is it ?- How to prevent it ?
  65. 65 ARP Spoofing / Poisoning - Demo | Man-in-the-Middle Attack
  66. 66 Security Policies- What are they ? Types of Security Policies - Email Security Policy Cybersecurity
  67. 67 Introduction to Internet Security Policy and its Contents - Cyber Security - CSE4003.
  68. 68 Metasploit for Detecting Null Sessions and Exploiting Samba Server(SMB)
  69. 69 Nessus Essentials Installation on Kali Linux [2024]
  70. 70 Mastering Nessus Scans: A Guide to Host Discovery, Basic Network Scan and Web Application Tests
  71. 71 WEP , WPA , WPA 2 and Four way Handshake
  72. 72 Wifi Hacking Using Aircrack-ng -The complete Guide
  73. 73 Database Vulnerabilities and Counter Measures
  74. 74 Exploiting MySQL Database using MetaSploit Auxiliary Modules [Kaii Linux 2024]
  75. 75 Network File System[NFS] Attack - Demo using Kali Linux 2024 and Metasploitable 2
  76. 76 Advanced Nmap: Using Scripts for MySQL, FTP, & SSH Exploitation
  77. 77 Nmap TCP Scanning & Flag Analysis - The Ultimate Guide
  78. 78 Domain Name System (DNS) - How does it work ?
  79. 79 DNS Enumeration: Mastering Host, Dig, Dnsenum, Dnsmap, & Dnsrecon
  80. 80 UFW (Uncomplicated Firewall) - Step by Step Demo
  81. 81 Understanding SQL Injection Attacks - Manual and Automated - How it Works?
  82. 82 Passive Sniffing with tcpdump: Essential Commands and Techniques
  83. 83 Managing Metasploit Data : A Guide to PostgreSQL Integration
  84. 84 MAC Flooding Attack Demo: Kali Linux Tutorial
  85. 85 Metasploit Meterpreter in Action: Demo of Remote Code Execution & File Transfer
  86. 86 How Cross-Site Request Forgery Attack (CSRF) Works: A Deep Dive
  87. 87 Reflected Cross Site Scripting (XSS) Attack: An In-Depth Look for Developers
  88. 88 Goodbye Passwords! Create a Google Passkey in Minutes
  89. 89 Metasploit JavaScript Keylogger: Capture Keystrokes with Auxiliary Module Tutorial

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.