Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cryptography and Cybersecurity Fundamentals

Satish C J via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore comprehensive cybersecurity fundamentals through this extensive lecture series covering mathematical foundations, cryptography, and practical ethical hacking techniques. Master essential mathematical concepts including modular arithmetic, congruence properties, Euclidean algorithms, and primality testing that form the backbone of modern cryptographic systems. Delve deep into cryptographic principles starting with basic operations like XOR and shift functions, progressing through classical ciphers such as Caesar, Playfair, Vigenere, and Hill ciphers, before advancing to modern encryption standards including DES, Triple DES, and AES with detailed finite field arithmetic explanations. Learn public key cryptography fundamentals through RSA algorithm implementations, Diffie-Hellman key exchange, ElGamal cryptosystem, and elliptic curve cryptography across multiple sessions. Understand hash functions, SHA-512 implementation, message authentication codes (MAC), HMAC, and digital signature schemes including ElGamal signatures and Digital Signature Standards. Transition into practical cybersecurity applications by setting up virtual hacking laboratories using VirtualBox and Kali Linux, then master essential penetration testing tools including Nmap for network scanning, SQL injection techniques using DVWA and SQLmap, network intrusion detection with Snort, and comprehensive password cracking methodologies using Hydra, Hashcat, John the Ripper, and Ophcrack. Gain hands-on experience with the Metasploit Framework through multiple sessions covering exploitation techniques, auxiliary modules, and Meterpreter functionality for remote code execution and file transfer. Practice various attack vectors including social engineering using SET toolkit, ARP spoofing for man-in-the-middle attacks, clickjacking, cross-site scripting (XSS), cross-site request forgery (CSRF), and denial-of-service attacks using Hping3. Explore wireless security by understanding WEP, WPA, and WPA2 protocols while learning WiFi hacking techniques with Aircrack-ng. Master vulnerability assessment using Nessus scanner for host discovery and web application testing, perform DNS enumeration with various tools, implement firewall configurations with UFW, and understand database security through MySQL exploitation techniques. Learn network file system attacks, advanced Nmap scripting for service exploitation, passive network sniffing with tcpdump, MAC flooding attacks, and modern authentication methods including Google Passkey implementation, while understanding security policy development and cyber law frameworks under the IT Act 2000.

Syllabus

Mathematics Basics - Cryptography - Cybersecurity - CSE4003
Modular Arithmetic - Congruence and its Properties - Cryptography - Cybersecurity - CSE4003
Finding mod of a Negative Number -- Cyber Security CSE4003
Modular Exponentiation - Cryptography - Cyber Security - CSE4003
Euclidean Algorithm for Finding GCD - Cryptography - Cyber Security - CSE4003
Extended Euclidean Algorithm - Cryptography - Cyber Security - CSE4003
Modular Multiplicative Inverse - Cryptography - Cyber Security - CSE4003
Chinese Remainder Theorem - Cryptography - Cyber Security CSE4003
Primality Testing - Fermat's little Theorem - Carmichael Numbers - Cyber Security CSE4003
Miller Rabin Primality Test with Examples - Cyber Security - CSE4003
Euler's Totient Function and Euler's Theorem - Cryptography - Cyber Security - CSE4003
Introduction to Cryptography - Cyber Security - CSE4003
Cryptography Basics - Bitwise XOR , Shift , Circular Shift Operations - Cyber Security - CSE4003
Block Cipher Vs Stream Cipher - Cryptography - Cyber Security - CSE4003
Block Cipher Modes - Cryptography - Cyber Security - CSE4003
Data Encryption Standard (DES) - Explained with an Example - Cryptography - CyberSecurity - CSE4003
Double DES and Triple DES - Meet in the Middle Attack - Cyber Security - CSE4003
Caeser Cipher and Multiplicative Cipher - Cryptography - Cyber Security CSE4003
Playfair Cipher - Explained with an Example - Cryptography - Cyber Security CSE4003
Vigenere Cipher - Explained with an Example - Cryptography - Cyber Security - CSE4003
Hill Cipher - Encryption and Decryption - Step by Step - Cryptography - Cyber Security - CSE4003
AES I - Group, Ring, Field and Finite Field - Abstract Algebra Basics - Cyber Security - CSE4003
AES II - Finite Field ( Galois Field ) Arithmetic for Advanced Encryption Standard - CSE4003
AES III - Advanced Encryption Standard - Introduction , Key Expansion in AES Cyber Security CSE4003
AES IV - Advanced Encryption Standard - Encryption and Decryption - Cyber Security CSE4003
Discrete Logarithm -Finding Primitive Roots - Cryptography - CSE4003
Diffie Hellman Key Exchange Algorithm - Cryptography - Cyber Security - CSE4003
Public key Cryptography - What is it? - Cryptography - Cyber Security - CSE4003
Elgamal Cryptosystem - Public key Cryptography - Cyber Security - CSE4003
RSA Algorithm - Explained with Examples - Cyber Security - CSE4003
Elliptic Curve Cryptography - Session 1 - Cyber Security CSE4003
Elliptic Curve Cryptography - Session 2 - Cyber Security - CSE4003
Introduction to Hash Functions and Application of Hash Functions in Cryptography - CSE4003
SHA 512 - Secure Hash Algorithm - Step by Step Explanation - Cryptography - Cyber Security - CSE4003
Message Authentication Code (MAC) and HMAC - Cryptography - Cyber Security CSE4003
What are Digital Signatures ? - Cryptography - Cyber Security - CSE4003
Elgamal Digital Signature - Cryptography - Cyber Security - CSE4003
Digital Signature Standard (DSS) - Cryptography - Cyber Security - CSE4003
What is a Cyber Crime ? Cyber Laws in India - IT ACT 2000 - Cybersecurity CSE4003
Setting up a Virtual Hacking Lab - Step by Step - Cyber Security - CSE4003
Metasploitable 2 - Installation on VirtualBox 6.1 - Cyber Security #8
How to install Oracle VM Virtualbox 7.0 on Windows
How to install Kali Linux 2024 on Virtualbox 7.0? [Windows host]
NMAP demo using Kali Linux 2020 - Ethical Hacking - Cyber Security #6
Manual SQL Injection Demo using DVWA - Ethical Hacking - Cyber Security #7
Sqlmap demo Using Kali Linux 2020 - SQL Injection using SQLMAP - Ethical Hacking Cyber Security #9
SNORT Demo - Network Intrusion Detection and Prevention System - Kali Linux - Cyber Security #10
Social Engineering - What is it ? Types of Social Engineering Attacks - How to Avoid them - CSE4003
Social Engineering Attack Demo - Kali Linux setoolkit - Cybersecurity - CSE4003
Social Engineering Attack - Kali Linux - Mass Mailer - demo
Password Cracking Tools - Introduction and Types - Online and Offline Password Cracking - CSE4003
Hydra Password Cracking Tool - Demo using Kali Linux - Cybersecurity - CSE4003
Hydra / Hydra Graphical Password Cracking Tool Demo
How to use Hashcat Password Cracking Tool ? - Demo using Kali Linux - Cybersecurity - CSE4003
Password Cracking with John the Ripper : Single, Wordlist, and Incremental Mode Deep Dive
Password Recovery using Ophcrack - Kali Linux - Demo
Metasploit Framework - Introduction - Modules in Metasploit
Metasploit Framework Session 2 - Demo - Exploiting VSFTPD 2.3.4 Service
Metasploit Auxiliary modules Demo - TCP Port Scanners, ftp_login, ssh_version and ssh_login
Ethical Hacking: Using Metasploit to Crack Passwords
Hping3 Demo- Kali Linux - Ping Flood and SYN Flood Attack - DOS and DDOS - Explained - CSE4003
Nikto Web Vulnerability Scanner - Web Penetration Testing
Clickjacking Attack - Demo - Web Application Attack
Persistent XSS (Cross Site Scripting) attack - What is it ?- How to prevent it ?
ARP Spoofing / Poisoning - Demo | Man-in-the-Middle Attack
Security Policies- What are they ? Types of Security Policies - Email Security Policy Cybersecurity
Introduction to Internet Security Policy and its Contents - Cyber Security - CSE4003.
Metasploit for Detecting Null Sessions and Exploiting Samba Server(SMB)
Nessus Essentials Installation on Kali Linux [2024]
Mastering Nessus Scans: A Guide to Host Discovery, Basic Network Scan and Web Application Tests
WEP , WPA , WPA 2 and Four way Handshake
Wifi Hacking Using Aircrack-ng -The complete Guide
Database Vulnerabilities and Counter Measures
Exploiting MySQL Database using MetaSploit Auxiliary Modules [Kaii Linux 2024]
Network File System[NFS] Attack - Demo using Kali Linux 2024 and Metasploitable 2
Advanced Nmap: Using Scripts for MySQL, FTP, & SSH Exploitation
Nmap TCP Scanning & Flag Analysis - The Ultimate Guide
Domain Name System (DNS) - How does it work ?
DNS Enumeration: Mastering Host, Dig, Dnsenum, Dnsmap, & Dnsrecon
UFW (Uncomplicated Firewall) - Step by Step Demo
Understanding SQL Injection Attacks - Manual and Automated - How it Works?
Passive Sniffing with tcpdump: Essential Commands and Techniques
Managing Metasploit Data : A Guide to PostgreSQL Integration
MAC Flooding Attack Demo: Kali Linux Tutorial
Metasploit Meterpreter in Action: Demo of Remote Code Execution & File Transfer
How Cross-Site Request Forgery Attack (CSRF) Works: A Deep Dive
Reflected Cross Site Scripting (XSS) Attack: An In-Depth Look for Developers
Goodbye Passwords! Create a Google Passkey in Minutes
Metasploit JavaScript Keylogger: Capture Keystrokes with Auxiliary Module Tutorial

Taught by

Satish C J

Reviews

Start your review of Cryptography and Cybersecurity Fundamentals

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.