🚀 Cyber Security Certification Notes
https://shop.motasem-notes.net/collections/cyber-security-study-notes
🚀OR Certification Notes with Cheat Sheets
https://buymeacoffee.com/notescatalog/extras
💡Cyber Security Notes | Membership Access
https://buymeacoffee.com/notescatalog/membership
🔥Download FREE Cyber Security 101 Study Notes
https://buymeacoffee.com/notescatalog/e/290985
***
In this video walk-through, we covered basics of Encyption and Cryptography by answering the questions in TryHackMe Encryption – Crypto 101 under complete beginner pathway.
#cryptography
#encryption
*********
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
*********
Writeup
https://motasem-notes.net/encyption-and-cryptography-101-tryhackme-encryption-crypto-101/
TryHackMe Encryption | Crypto 101
https://tryhackme.com/room/encryptioncrypto101
*******
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
https://www.instagram.com/motasem.hamdan.official/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
Tweets by ManMotasem
https://www.facebook.com/motasemhamdantty/
****
0:00 – Introduction to Encryption 101
0:11 – Key Terms in Cryptography
0:36 – Task 2: SSH Key Protection – Passphrase vs. Password
0:48 – Importance of Encryption
1:02 – How Web Servers Prove Their Identity with Certificates
1:17 – Compliance Standards for Payment Data – PCI DSS
1:53 – Introduction to Mathematical Foundations in Cryptography
2:40 – Task 4: Understanding Modulus Operations
3:45 – Using Python for Modulus Calculations
4:21 – Types of Encryption: DES and Triple DES
5:06 – Public Key Sharing in Asymmetric Encryption
5:51 – RSA Algorithm and Calculating Key Variables
6:46 – Example: Calculating N in RSA with Python
7:10 – Establishing Keys Using Asymmetric Cryptography
7:26 – Identifying Certificate Issuers (Cloudflare Example)
7:41 – Task 7: SSH Authentication and Cracking Passphrases
8:13 – Extracting and Cracking SSH Key Passphrase with John
8:53 – Identifying Encryption Algorithms in SSH
9:00 – Diffie-Hellman Key Exchange Overview
9:12 – PGP/GPG Encryption and Decryption
9:24 – Using GPG to Decrypt Files with Private Keys
10:13 – Importing Private Key and Decrypting Encrypted Message
10:45 – Retrieving Secret Word from Decrypted File
10:53 – Summary and Room Completion
11:01 – Upcoming TryHackMe Challenges


Comments