Completed
What is a Cyber Crime ? Cyber Laws in India - IT ACT 2000 - Cybersecurity CSE4003
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptography and Cybersecurity Fundamentals
Automatically move to the next video in the Classroom when playback concludes
- 1 Mathematics Basics - Cryptography - Cybersecurity - CSE4003
- 2 Modular Arithmetic - Congruence and its Properties - Cryptography - Cybersecurity - CSE4003
- 3 Finding mod of a Negative Number -- Cyber Security CSE4003
- 4 Modular Exponentiation - Cryptography - Cyber Security - CSE4003
- 5 Euclidean Algorithm for Finding GCD - Cryptography - Cyber Security - CSE4003
- 6 Extended Euclidean Algorithm - Cryptography - Cyber Security - CSE4003
- 7 Modular Multiplicative Inverse - Cryptography - Cyber Security - CSE4003
- 8 Chinese Remainder Theorem - Cryptography - Cyber Security CSE4003
- 9 Primality Testing - Fermat's little Theorem - Carmichael Numbers - Cyber Security CSE4003
- 10 Miller Rabin Primality Test with Examples - Cyber Security - CSE4003
- 11 Euler's Totient Function and Euler's Theorem - Cryptography - Cyber Security - CSE4003
- 12 Introduction to Cryptography - Cyber Security - CSE4003
- 13 Cryptography Basics - Bitwise XOR , Shift , Circular Shift Operations - Cyber Security - CSE4003
- 14 Block Cipher Vs Stream Cipher - Cryptography - Cyber Security - CSE4003
- 15 Block Cipher Modes - Cryptography - Cyber Security - CSE4003
- 16 Data Encryption Standard (DES) - Explained with an Example - Cryptography - CyberSecurity - CSE4003
- 17 Double DES and Triple DES - Meet in the Middle Attack - Cyber Security - CSE4003
- 18 Caeser Cipher and Multiplicative Cipher - Cryptography - Cyber Security CSE4003
- 19 Playfair Cipher - Explained with an Example - Cryptography - Cyber Security CSE4003
- 20 Vigenere Cipher - Explained with an Example - Cryptography - Cyber Security - CSE4003
- 21 Hill Cipher - Encryption and Decryption - Step by Step - Cryptography - Cyber Security - CSE4003
- 22 AES I - Group, Ring, Field and Finite Field - Abstract Algebra Basics - Cyber Security - CSE4003
- 23 AES II - Finite Field ( Galois Field ) Arithmetic for Advanced Encryption Standard - CSE4003
- 24 AES III - Advanced Encryption Standard - Introduction , Key Expansion in AES Cyber Security CSE4003
- 25 AES IV - Advanced Encryption Standard - Encryption and Decryption - Cyber Security CSE4003
- 26 Discrete Logarithm -Finding Primitive Roots - Cryptography - CSE4003
- 27 Diffie Hellman Key Exchange Algorithm - Cryptography - Cyber Security - CSE4003
- 28 Public key Cryptography - What is it? - Cryptography - Cyber Security - CSE4003
- 29 Elgamal Cryptosystem - Public key Cryptography - Cyber Security - CSE4003
- 30 RSA Algorithm - Explained with Examples - Cyber Security - CSE4003
- 31 Elliptic Curve Cryptography - Session 1 - Cyber Security CSE4003
- 32 Elliptic Curve Cryptography - Session 2 - Cyber Security - CSE4003
- 33 Introduction to Hash Functions and Application of Hash Functions in Cryptography - CSE4003
- 34 SHA 512 - Secure Hash Algorithm - Step by Step Explanation - Cryptography - Cyber Security - CSE4003
- 35 Message Authentication Code (MAC) and HMAC - Cryptography - Cyber Security CSE4003
- 36 What are Digital Signatures ? - Cryptography - Cyber Security - CSE4003
- 37 Elgamal Digital Signature - Cryptography - Cyber Security - CSE4003
- 38 Digital Signature Standard (DSS) - Cryptography - Cyber Security - CSE4003
- 39 What is a Cyber Crime ? Cyber Laws in India - IT ACT 2000 - Cybersecurity CSE4003
- 40 Setting up a Virtual Hacking Lab - Step by Step - Cyber Security - CSE4003
- 41 Metasploitable 2 - Installation on VirtualBox 6.1 - Cyber Security #8
- 42 How to install Oracle VM Virtualbox 7.0 on Windows
- 43 How to install Kali Linux 2024 on Virtualbox 7.0? [Windows host]
- 44 NMAP demo using Kali Linux 2020 - Ethical Hacking - Cyber Security #6
- 45 Manual SQL Injection Demo using DVWA - Ethical Hacking - Cyber Security #7
- 46 Sqlmap demo Using Kali Linux 2020 - SQL Injection using SQLMAP - Ethical Hacking Cyber Security #9
- 47 SNORT Demo - Network Intrusion Detection and Prevention System - Kali Linux - Cyber Security #10
- 48 Social Engineering - What is it ? Types of Social Engineering Attacks - How to Avoid them - CSE4003
- 49 Social Engineering Attack Demo - Kali Linux setoolkit - Cybersecurity - CSE4003
- 50 Social Engineering Attack - Kali Linux - Mass Mailer - demo
- 51 Password Cracking Tools - Introduction and Types - Online and Offline Password Cracking - CSE4003
- 52 Hydra Password Cracking Tool - Demo using Kali Linux - Cybersecurity - CSE4003
- 53 Hydra / Hydra Graphical Password Cracking Tool Demo
- 54 How to use Hashcat Password Cracking Tool ? - Demo using Kali Linux - Cybersecurity - CSE4003
- 55 Password Cracking with John the Ripper : Single, Wordlist, and Incremental Mode Deep Dive
- 56 Password Recovery using Ophcrack - Kali Linux - Demo
- 57 Metasploit Framework - Introduction - Modules in Metasploit
- 58 Metasploit Framework Session 2 - Demo - Exploiting VSFTPD 2.3.4 Service
- 59 Metasploit Auxiliary modules Demo - TCP Port Scanners, ftp_login, ssh_version and ssh_login
- 60 Ethical Hacking: Using Metasploit to Crack Passwords
- 61 Hping3 Demo- Kali Linux - Ping Flood and SYN Flood Attack - DOS and DDOS - Explained - CSE4003
- 62 Nikto Web Vulnerability Scanner - Web Penetration Testing
- 63 Clickjacking Attack - Demo - Web Application Attack
- 64 Persistent XSS (Cross Site Scripting) attack - What is it ?- How to prevent it ?
- 65 ARP Spoofing / Poisoning - Demo | Man-in-the-Middle Attack
- 66 Security Policies- What are they ? Types of Security Policies - Email Security Policy Cybersecurity
- 67 Introduction to Internet Security Policy and its Contents - Cyber Security - CSE4003.
- 68 Metasploit for Detecting Null Sessions and Exploiting Samba Server(SMB)
- 69 Nessus Essentials Installation on Kali Linux [2024]
- 70 Mastering Nessus Scans: A Guide to Host Discovery, Basic Network Scan and Web Application Tests
- 71 WEP , WPA , WPA 2 and Four way Handshake
- 72 Wifi Hacking Using Aircrack-ng -The complete Guide
- 73 Database Vulnerabilities and Counter Measures
- 74 Exploiting MySQL Database using MetaSploit Auxiliary Modules [Kaii Linux 2024]
- 75 Network File System[NFS] Attack - Demo using Kali Linux 2024 and Metasploitable 2
- 76 Advanced Nmap: Using Scripts for MySQL, FTP, & SSH Exploitation
- 77 Nmap TCP Scanning & Flag Analysis - The Ultimate Guide
- 78 Domain Name System (DNS) - How does it work ?
- 79 DNS Enumeration: Mastering Host, Dig, Dnsenum, Dnsmap, & Dnsrecon
- 80 UFW (Uncomplicated Firewall) - Step by Step Demo
- 81 Understanding SQL Injection Attacks - Manual and Automated - How it Works?
- 82 Passive Sniffing with tcpdump: Essential Commands and Techniques
- 83 Managing Metasploit Data : A Guide to PostgreSQL Integration
- 84 MAC Flooding Attack Demo: Kali Linux Tutorial
- 85 Metasploit Meterpreter in Action: Demo of Remote Code Execution & File Transfer
- 86 How Cross-Site Request Forgery Attack (CSRF) Works: A Deep Dive
- 87 Reflected Cross Site Scripting (XSS) Attack: An In-Depth Look for Developers
- 88 Goodbye Passwords! Create a Google Passkey in Minutes
- 89 Metasploit JavaScript Keylogger: Capture Keystrokes with Auxiliary Module Tutorial