07/10/2021 cyber security

  • Period: to

    30/09/2021

    Last lesson we began the configuration of an SSH Network between a router and PC. We also looked at the different types of cyber threats and looked at why attackers use them and how.
  • Period: to

    07/10/2021 cyber security

    Today we did various exercises to help us gain a further insight into the world of cryptography within cyber security.
    This ranged from looking at looking at the key features of algorithms like AES to the understanding of Access Control List such as what is the difference between standard and extended ACL.