03:24duration 3 minutes 24 seconds
Lab 3: Conclusion
Impact of ransomware and takeaways
06:28duration 6 minutes 28 seconds
Lab 3: Software Integrity
How to use hashing and signatures to get software…
02:54duration 2 minutes 54 seconds
Lab 3: Ransomware with PKC
07:00duration 7 minutes 0 seconds
Lab 3: Public Key Crypto (PKC)
How to split up a key to public and private
05:10duration 5 minutes 10 seconds
Lab 3: Ransomware with symmetric encryption
The mechanics of ransomware
05:04duration 5 minutes 4 seconds
Lab 3: Symmetric Encryption
How do we write secretly
03:06duration 3 minutes 6 seconds
Lab 3 Overview: What is cryptography
How is cryptography used for offense and defense…