-
Cyber
-
Types of hackers
Dealing with hacker
Three dimensions -
Security devices
Key encryption
Technologies -
-
Types of hashes
Creating own hashes
Changing the hashes -
Types of hashing algorithms
Purpose of hashes
Description of hashes -
Watching the interview
Summary
Thoughts -
Description of each
Compare
Examples -
Understand the cipher
Create the table
Create own cipher -
Watch the videos Answer the questions
-
A list shows items. A timeline shows sequence.
Use Timetoast to make dates, milestones, and turning points easier to understand in a clear visual format. Timetoast is a timeline maker for work, school, research, and stories.