Overview
Syllabus
Mathematics Basics - Cryptography - Cybersecurity - CSE4003
Modular Arithmetic - Congruence and its Properties - Cryptography - Cybersecurity - CSE4003
Finding mod of a Negative Number -- Cyber Security CSE4003
Modular Exponentiation - Cryptography - Cyber Security - CSE4003
Euclidean Algorithm for Finding GCD - Cryptography - Cyber Security - CSE4003
Extended Euclidean Algorithm - Cryptography - Cyber Security - CSE4003
Modular Multiplicative Inverse - Cryptography - Cyber Security - CSE4003
Chinese Remainder Theorem - Cryptography - Cyber Security CSE4003
Primality Testing - Fermat's little Theorem - Carmichael Numbers - Cyber Security CSE4003
Miller Rabin Primality Test with Examples - Cyber Security - CSE4003
Euler's Totient Function and Euler's Theorem - Cryptography - Cyber Security - CSE4003
Introduction to Cryptography - Cyber Security - CSE4003
Cryptography Basics - Bitwise XOR , Shift , Circular Shift Operations - Cyber Security - CSE4003
Block Cipher Vs Stream Cipher - Cryptography - Cyber Security - CSE4003
Block Cipher Modes - Cryptography - Cyber Security - CSE4003
Data Encryption Standard (DES) - Explained with an Example - Cryptography - CyberSecurity - CSE4003
Double DES and Triple DES - Meet in the Middle Attack - Cyber Security - CSE4003
Caeser Cipher and Multiplicative Cipher - Cryptography - Cyber Security CSE4003
Playfair Cipher - Explained with an Example - Cryptography - Cyber Security CSE4003
Vigenere Cipher - Explained with an Example - Cryptography - Cyber Security - CSE4003
Hill Cipher - Encryption and Decryption - Step by Step - Cryptography - Cyber Security - CSE4003
AES I - Group, Ring, Field and Finite Field - Abstract Algebra Basics - Cyber Security - CSE4003
AES II - Finite Field ( Galois Field ) Arithmetic for Advanced Encryption Standard - CSE4003
AES III - Advanced Encryption Standard - Introduction , Key Expansion in AES Cyber Security CSE4003
AES IV - Advanced Encryption Standard - Encryption and Decryption - Cyber Security CSE4003
Discrete Logarithm -Finding Primitive Roots - Cryptography - CSE4003
Diffie Hellman Key Exchange Algorithm - Cryptography - Cyber Security - CSE4003
Public key Cryptography - What is it? - Cryptography - Cyber Security - CSE4003
Elgamal Cryptosystem - Public key Cryptography - Cyber Security - CSE4003
RSA Algorithm - Explained with Examples - Cyber Security - CSE4003
Elliptic Curve Cryptography - Session 1 - Cyber Security CSE4003
Elliptic Curve Cryptography - Session 2 - Cyber Security - CSE4003
Introduction to Hash Functions and Application of Hash Functions in Cryptography - CSE4003
SHA 512 - Secure Hash Algorithm - Step by Step Explanation - Cryptography - Cyber Security - CSE4003
Message Authentication Code (MAC) and HMAC - Cryptography - Cyber Security CSE4003
What are Digital Signatures ? - Cryptography - Cyber Security - CSE4003
Elgamal Digital Signature - Cryptography - Cyber Security - CSE4003
Digital Signature Standard (DSS) - Cryptography - Cyber Security - CSE4003
What is a Cyber Crime ? Cyber Laws in India - IT ACT 2000 - Cybersecurity CSE4003
Setting up a Virtual Hacking Lab - Step by Step - Cyber Security - CSE4003
Metasploitable 2 - Installation on VirtualBox 6.1 - Cyber Security #8
How to install Oracle VM Virtualbox 7.0 on Windows
How to install Kali Linux 2024 on Virtualbox 7.0? [Windows host]
NMAP demo using Kali Linux 2020 - Ethical Hacking - Cyber Security #6
Manual SQL Injection Demo using DVWA - Ethical Hacking - Cyber Security #7
Sqlmap demo Using Kali Linux 2020 - SQL Injection using SQLMAP - Ethical Hacking Cyber Security #9
SNORT Demo - Network Intrusion Detection and Prevention System - Kali Linux - Cyber Security #10
Social Engineering - What is it ? Types of Social Engineering Attacks - How to Avoid them - CSE4003
Social Engineering Attack Demo - Kali Linux setoolkit - Cybersecurity - CSE4003
Social Engineering Attack - Kali Linux - Mass Mailer - demo
Password Cracking Tools - Introduction and Types - Online and Offline Password Cracking - CSE4003
Hydra Password Cracking Tool - Demo using Kali Linux - Cybersecurity - CSE4003
Hydra / Hydra Graphical Password Cracking Tool Demo
How to use Hashcat Password Cracking Tool ? - Demo using Kali Linux - Cybersecurity - CSE4003
Password Cracking with John the Ripper : Single, Wordlist, and Incremental Mode Deep Dive
Password Recovery using Ophcrack - Kali Linux - Demo
Metasploit Framework - Introduction - Modules in Metasploit
Metasploit Framework Session 2 - Demo - Exploiting VSFTPD 2.3.4 Service
Metasploit Auxiliary modules Demo - TCP Port Scanners, ftp_login, ssh_version and ssh_login
Ethical Hacking: Using Metasploit to Crack Passwords
Hping3 Demo- Kali Linux - Ping Flood and SYN Flood Attack - DOS and DDOS - Explained - CSE4003
Nikto Web Vulnerability Scanner - Web Penetration Testing
Clickjacking Attack - Demo - Web Application Attack
Persistent XSS (Cross Site Scripting) attack - What is it ?- How to prevent it ?
ARP Spoofing / Poisoning - Demo | Man-in-the-Middle Attack
Security Policies- What are they ? Types of Security Policies - Email Security Policy Cybersecurity
Introduction to Internet Security Policy and its Contents - Cyber Security - CSE4003.
Metasploit for Detecting Null Sessions and Exploiting Samba Server(SMB)
Nessus Essentials Installation on Kali Linux [2024]
Mastering Nessus Scans: A Guide to Host Discovery, Basic Network Scan and Web Application Tests
WEP , WPA , WPA 2 and Four way Handshake
Wifi Hacking Using Aircrack-ng -The complete Guide
Database Vulnerabilities and Counter Measures
Exploiting MySQL Database using MetaSploit Auxiliary Modules [Kaii Linux 2024]
Network File System[NFS] Attack - Demo using Kali Linux 2024 and Metasploitable 2
Advanced Nmap: Using Scripts for MySQL, FTP, & SSH Exploitation
Nmap TCP Scanning & Flag Analysis - The Ultimate Guide
Domain Name System (DNS) - How does it work ?
DNS Enumeration: Mastering Host, Dig, Dnsenum, Dnsmap, & Dnsrecon
UFW (Uncomplicated Firewall) - Step by Step Demo
Understanding SQL Injection Attacks - Manual and Automated - How it Works?
Passive Sniffing with tcpdump: Essential Commands and Techniques
Managing Metasploit Data : A Guide to PostgreSQL Integration
MAC Flooding Attack Demo: Kali Linux Tutorial
Metasploit Meterpreter in Action: Demo of Remote Code Execution & File Transfer
How Cross-Site Request Forgery Attack (CSRF) Works: A Deep Dive
Reflected Cross Site Scripting (XSS) Attack: An In-Depth Look for Developers
Goodbye Passwords! Create a Google Passkey in Minutes
Metasploit JavaScript Keylogger: Capture Keystrokes with Auxiliary Module Tutorial
Taught by
Satish C J