Cryptography

In this installment we will examine the backbone of internet security - the science of cryptography has been around for 100s of years and in particular, digital encryoption is of the uptmost important in keeping the sensitive affairs of the internet safe. With many applications we will look at some of the ways the current encryption standards can be exploited.

In this chapter we will look specially at

  • HASH EXTENSION ATTACKS
  • SECRET KEY ENCRYPTION
  • PUBLIC KEY ENCRYPTION
  • MD5 COLLISION ATTACKS

What You Get

You will be able to examine these threats with the potential to compromise key elements in the securing of the general internet. It is impportant to have a keen understanding of hashing and secret/public key encryption mechanics to protect the effiicacy of cryptography

When It Happens

Come join us each XXXXXXday from TBD for 4 weeks to start your Cyberfitness Journey to become one of the good guys and build up your ethical hacker toolbox. This is an interactive lab bootcamp with the intention for you to get your hands dirty. Haven’t written code before, no problem, we get you started and walk you through

How to get it

See what’s happening at https://academy.cyberfitness.com
Or contact us at [email protected]
BootCamp Cost $400.00
To enroll signup at BOOTCAMPURL