-
- Using the Hashcalc software
- Comparing hash results
- Comparing different hashing algorithms
-
- When certain algorithms were created
- How many bits they use
- Which construction they use
-
- Types of attacks
- Methods of defending against attackers
- Cybersecurity terminology
-
- Laws pertaining to cybersecurity
- States of data
- More cybersecurity terminology
-
- Types of malware
- Methods used by hackers
- Computer vulnerabilities
-
- How Google protects customer data
- How to use 2-step verification
- How to check your Gmail account for attackers
-
- How both types of algorithms work 2. Specific symmetric encryption algorithms 3. Specific asymmetric encryption algorithms
-
- How vigenere tables work 2. Creating our own vigenere table 3. Making our own encrypted message with our vigenere table
-
- How computer networks work 2. Using Packet Tracer 3. Different features and processes of networks
-
Ftp Server: Allows users to share and exchange data. Web Server: Processes and delivers webpages to users. Email Server: Stores and distributes virtual mail. DNS Server: Converts domain names to IP addresses so users can access internet resources. NTP Server: Keeps track of real-world time. AAA Server: Identifies users, determines their permissions and keeps track of their resources.
-
- Making use of different servers 2. How computers communicate 3. Sending/Receiving files
-
- The uses of encryption 2. Ways to decrypt encrypted data 3. Sending and receiving E-mails
-
- How to deal with tampered data 2. The uses of hashing 3. Checking encrypted data
-
- Different types of wireless connections 2. How to set up wireless connections 3. How to improve network security