Training material that covers the basics of cyber security
Learn about the fundamentals of cyber security.
Binary and hexadecimal are numbering systems based upon 2 and
16.
Source:
whisk0r
Every file has a structure, and every structure can have risks.
File types can be manipulated to hide data inside.
Source:
LiveOverflow
A character set is a mapping from characters (e.g., alphabet,
numbers, punctuation) into bytes. Unicode is the most common
character set in the world, and UTF-8 is the most common encoding
of Unicode.
Read More.
Source: Tom Scott via
Computerphile
This video gives an introduction to data structures such as
arrays, list, stacks, and queues; it demonstrates them using
Python code.
Source:
Brian Will
via Code School
This video explains what metadata is and answers common questions
about it.
Source: Kopana Terry via
MMfilm2digitutorials
An operating system (OS) is the software that manages a computer’s
hardware, software, and services.
Source:
Shaun Michael K. Stone
An operating system (OS) is the software that manages a computer’s
hardware, software, and services.
Source:
Brian Will
via Code School
A kernel is a program that manages I/O requests from software and
translates them into CPU instructions.
Source:
Martino Jones
File systems control how data is stored on disks.
Source:
O'Reilly - Video Training
This video gives an introduction to the basics of networking, such
as Ethernet, MAC addresses, IP Addresses, packet switching,
network switches, and TCP/IP.
Source:
CrashCourse
OSI Model – The OSI model is a model of how network protocols and
equipment communicate with each other.
Source:
Professor Messer
Hypertext transfer protocol secure (HTTPS) is a secure version of
HTTP. The connection is encrypted with TLS or SSL, thus protecting
the privacy and integrity of any data that is exchanged.
Source:
WebConcepts
A cookie is a set of information sent from a web server to a web
client. The information is formatted as a comma-delimited list of
name/value pairs, typically contains state information about user
activity, and is expected to be retrieved later.
Source:
Adversitement
The domain name system (DNS) is a distributed naming system for
computers and services connected to a network. It’s most important
feature is converting a domain name (www.google.com) into its
corresponding IP address
Source:
DNS Made Easy Videos
A database stores digital data. A relational database maintains a
collection of tables to store data and relate them to each
other.
Source:
Al Zimmerman
A database stores digital data. A relational database maintains a
collection of tables to store data and relate them to each
other.
Source:
learningsqlserver
A web server is a computer that serves web pages and applications
to users.
Source:
WinningWP
Steganography is the practice of hiding data within other data
such that the hidden data cannot be detected. For example, a text
file can be hidden within an image file without changing the
image. Steganography can be used for covert communications.
Source:
Computerphile
These videos cover some of the basics of cryptography, including
symmetric/asymmetric encryption, ciphers, and hash functions.
Source:
CrashCourse
These videos cover some of the basics of cryptography, including
symmetric/asymmetric encryption, ciphers, and hash functions.
Source:
Sci Show
These videos cover some of the basics of cryptography, with
examples of the different concepts.
Source:
Fireship
Symmetric Encryption – This video explains the basics of symmetric
encryption, which is one way of protecting data so that two users
can securely exchange information.
Source:
ITfreetraining
Basic Cryptanalysis and Block Ciphers – This video overviews the
basics of cryptanalysis and block ciphers.
Source:
Aleksander Essex
Asymmetric Encryption – This video explains the basics of
asymmetric encryption, another way of protecting data so that two
users can securely exchange information.
Source:
Simply Explained
This video introduces the authentication and key exchange, which
are foundational blocks for encryption.
Source:
Computerphile