-
Cyber
-
Types of hackers
Dealing with hacker
Three dimensions -
Security devices
Key encryption
Technologies -
-
Types of hashes
Creating own hashes
Changing the hashes -
Types of hashing algorithms
Purpose of hashes
Description of hashes -
Watching the interview
Summary
Thoughts -
Description of each
Compare
Examples -
Understand the cipher
Create the table
Create own cipher -
Watch the videos Answer the questions
-