-
cyber
-
three detention
types of hackers
dealing with hackers -
security devices
key encryption
technologies -
changing the hashes
crating own hashes
types of hashes -
-
types of hashes
purpose of hashes
description of hashes -
-
watch interview and write down key points
-
description of each
-
understand cipher
make cipher -
watch vid
answer question