Professor Wolf
Professor Wolf
  • Видео 60
  • Просмотров 72 641
Comptia Competition SEC + 1.4
Paris Wolf CompTIA Competition submission.
Reviewing objectives 1.4
PKI, Public Key, Private Key, Asymmetric Encryption, RSA, Key Escrow, Key Exchange Diffie-Hellman, Transport Layer Security, Symmetric Encryption, AES, Key Length, Encryption, Full Disk Encryption, Partition, Volume, File Encryption, Database, Record, Bonus Content
#CompTIACastingCall
#ad
#CompTIAContest
Просмотров: 48

Видео

AI Learning
Просмотров 4314 дней назад
An introduction to AI focusing on building a Binary AI. Cancer File: github.com/VoidKnight-AI/Binary-AI Google CoLab: colab.research.google.com/ Pandas: pandas.pydata.org/ NumPy: numpy.org/ TensorFlow: www.tensorflow.org/ SKLearn: scikit-learn.org/stable/index.html
Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman
Просмотров 31914 дней назад
Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman
1.4 Encryption
Просмотров 4114 дней назад
Full Disk Encryption, Partition, Volume, File, Record, Database
1.3 Change management, technical implementations, Documentation, version control
Просмотров 703 месяца назад
Paris Wolf teaches Security 701. Change management, technical implementations, Documentation, version control.
1.2 Physical security, Honeypot
Просмотров 473 месяца назад
Paris Wolf teaches security 701. Physical security Bollard, fence, mantrap, sensors, Honeypot, honeynet, honeyfile
1.2 GAP Analysis, Zero Trust, Control Plane, Data Plane
Просмотров 1663 месяца назад
GAP Analysis, Zero Trust, Control Plane, Data Plane, Adaptive Identity, Threat Scope Reduction, Policy-Driven access control, Policy Administration, Policy Engine Implicit trust zones, Subject/System, Policy Enforcement Point
1.2 CIA, Non Repudiation, AAA
Просмотров 1113 месяца назад
Paris Wolf Teaches Confidentiality, Integrity, Availability, Non-Repudiation, Authentication, Authorization, Accounting
1.1 Control Types
Просмотров 854 месяца назад
Paris Wolf Teaches Security 701. Preventative, Deterrent, Detective, Corrective, Compensating, Directive
1.0 Security Controls
Просмотров 1214 месяца назад
Paris Wolf teaches Security 701. Technical controls, Managerial Controls, Operational Controls, Physical Controls
how to get your application pulled without knowing anyone
Просмотров 3274 месяца назад
Paris Wolf teaches how to get a job by having your application pulled without knowing anyone.
Cert types ,Digital Certificate stages, states of revocation
Просмотров 1,1 тыс.4 месяца назад
Paris Wolf teaches cryptography. Cert types ,Digital Certificate stages, states of revocation
Cryptocracking
Просмотров 1 тыс.4 месяца назад
Paris Wolf teaches cryptography. Exhaustive Search, Known Plaintext attack, Man In the Middle, Chosen-Ciphertext, Active Attack, Replay attack, cut-and-paste, Time Resetting, Time attack, RSA Cracking
key escrow, anobus, AES weakness
Просмотров 1,1 тыс.4 месяца назад
Paris Wolf teaches cryptography. key escrow, anobus, AES weakness
One, Two Way Authentication, EndtoEnd and Intermediate Authentication, Types of Authentication
Просмотров 1,1 тыс.4 месяца назад
Paris Wolf teaches Cryptography. One/Two Way Authentication, EndtoEnd and Intermediate Authentication, Types of Authentication
IKE, TOR
Просмотров 1 тыс.4 месяца назад
IKE, TOR
CBC-MAC CCM, Windows hashing, Linux hashing
Просмотров 1,2 тыс.4 месяца назад
CBC-MAC CCM, Windows hashing, Linux hashing
ChaCha20, A5 cipher
Просмотров 9684 месяца назад
ChaCha20, A5 cipher
Frequency analysis
Просмотров 1,4 тыс.4 месяца назад
Frequency analysis
RC4, WPA, WPA2, Wireless protocols
Просмотров 9864 месяца назад
RC4, WPA, WPA2, Wireless protocols
Light-weight cryptography
Просмотров 9044 месяца назад
Light-weight cryptography
Bitcoin, Ethereum
Просмотров 1 тыс.4 месяца назад
Bitcoin, Ethereum
PBKDF2, noncryptographic hash, Password Strength, Cloud Cracking
Просмотров 1,3 тыс.4 месяца назад
PBKDF2, noncryptographic hash, Password Strength, Cloud Cracking
Hashing Classification, LM, NTLM
Просмотров 4144 месяца назад
Hashing Classification, LM, NTLM
LDAP, PHPass, Cisco Hashes
Просмотров 1,2 тыс.4 месяца назад
LDAP, PHPass, Cisco Hashes
Rainbow Table, HMAC, APR1
Просмотров 1,3 тыс.4 месяца назад
Rainbow Table, HMAC, APR1
Tunnel, Transport, AH, ESP
Просмотров 1,3 тыс.4 месяца назад
Tunnel, Transport, AH, ESP
Salt, Bcrypt
Просмотров 1,3 тыс.4 месяца назад
Salt, Bcrypt
Hash collision, Preimage Attack, Birthday Attack
Просмотров 1,7 тыс.4 месяца назад
Hash collision, Preimage Attack, Birthday Attack
Hashing
Просмотров 1,5 тыс.4 месяца назад
Hashing

Комментарии

  • @spartansoldier46
    @spartansoldier46 2 часа назад

    I just passed the assessment on my first attempt thanks to your series. I appreciate your help professor!

  • @towely
    @towely 3 дня назад

    This is such an impressively simple concept but it just seems so hard for people to wrap their heads around, myself included. This broke it down just enough to make it stick.

  • @Megan-bl5qm
    @Megan-bl5qm 12 дней назад

    Great videos! They are really helping me with this class. I am curious about one thing though: Why do asymmetric keys have to be longer to have the same security as symmetric keys? Is it because they take longer to process?

    • @Professorial_Wolf
      @Professorial_Wolf 12 дней назад

      it is a one way math formula and it has to use large key because at the same size their are only so many possibilities for prime numbers/ unique numbers versus symmetric that could use any of the numbers in their math equation. With a one way math formula you are forced to use these prime numbers so the message can not be easily cracked

    • @Megan-bl5qm
      @Megan-bl5qm 11 дней назад

      @@Professorial_Wolf That makes sense. Thank you!

  • @andrewstaples9947
    @andrewstaples9947 16 дней назад

    I like that you say being an engineer means looking alot of stuff up...I'm a computer tech for a school district (our title, basically desktop support) and we joke in our team that the secret of our jobs is we are just better at googling than others.

    • @Professorial_Wolf
      @Professorial_Wolf 15 дней назад

      Yes it is a great learning opportunity walking through the fire.

  • @andrewstaples9947
    @andrewstaples9947 16 дней назад

    whats with the hard cut on Question 16?

    • @Professorial_Wolf
      @Professorial_Wolf 15 дней назад

      my second video ever created. bad editing! I should remake it... you want to make it and I will post it up?!? I can send you the slides

  • @Professorial_Wolf
    @Professorial_Wolf 18 дней назад

    Full Code: # Import Libraries import pandas as pd import numpy as np import tensorflow as tf from sklearn.model_selection import train_test_split # Load the dataset dataset = pd.read_csv('cancer.csv') x = dataset.drop(columns=["diagnosis(1=m, 0=b)"]) y = dataset["diagnosis(1=m, 0=b)"] # Split the dataset into training and test sets x_train, x_test, y_train, y_test = train_test_split(x, y, test_size=0.2) # Build and train the model model = tf.keras.models.Sequential() model.add(tf.keras.layers.Dense(256, input_shape=x_train.shape[1:], activation='sigmoid')) model.add(tf.keras.layers.Dense(256, activation='sigmoid')) model.add(tf.keras.layers.Dense(1, activation='sigmoid')) model.compile(optimizer='adam', loss='binary_crossentropy', metrics=['accuracy']) model.fit(x_train, y_train, epochs=1000) # Evaluate the model on the test set loss, accuracy = model.evaluate(x_test, y_test) print(f"Accuracy on the test set: {accuracy}") # Prepare and predict the new tumor data new_tumor_data = np.array([[13.54, 14.36, 87.46, 566.3, 0.09779, 0.08129, 0.06664, 0.04781, 0.1885, 0.05766, 0.2699, 0.7886, 2.058, 23.56, 0.008462, 0.0146, 0.02387, 0.01315, 0.0198, 0.0023, 15.11, 19.26, 99.7, 711.2, 0.144, 0.1773, 0.239, 0.1288, 0.2977, 0.07259]]) prediction = model.predict(new_tumor_data) print(f"Prediction for the new tumor data: {prediction}") # Determine the diagnosis based on the prediction threshold = 0.5 accuracy_rating = accuracy diagnosis = "malignant" if prediction >= threshold else "benign" print(f"The predicted diagnosis is: {diagnosis}. Accuracy: {accuracy_rating}")

  • @Professorial_Wolf
    @Professorial_Wolf 20 дней назад

    Oh no everything is on the left hand side of the screen. who would do this!

  • @Rob-uj8bo
    @Rob-uj8bo Месяц назад

    I've learned more in these 4 videos than I did listening to the whole D334 book summary

    • @Professorial_Wolf
      @Professorial_Wolf Месяц назад

      Thank you Rob

    • @Rob-uj8bo
      @Rob-uj8bo Месяц назад

      @@Professorial_Wolf Just took my D334 Cryptography test after watching your series twice and passed by a good margin. I took the pre assessment when I started and was no where near the cutoff. 4 days and done thanks again Wolf!

    • @Professorial_Wolf
      @Professorial_Wolf 17 дней назад

      @@Rob-uj8bo absolutely.highest amount of passes in the I.T. Courses over all instructors

    • @rkb3991
      @rkb3991 День назад

      @@Rob-uj8boall you did was watch his videos?

  • @olafharoldsonnii4713
    @olafharoldsonnii4713 Месяц назад

    Thanks Professor wolf!

  • @jefferyjohnson1323
    @jefferyjohnson1323 Месяц назад

    Thank you for sharing your knowledge

    • @Professorial_Wolf
      @Professorial_Wolf Месяц назад

      So nice of you. Consider making an i.t. Video and I will post it up!

  • @jefferyjohnson1323
    @jefferyjohnson1323 Месяц назад

    Thank you 🙏

  • @jefferyjohnson1323
    @jefferyjohnson1323 Месяц назад

    Thank you 🙏

  • @hareboy12345
    @hareboy12345 Месяц назад

    I liked how you explained the Get-FileHash. Thanks for that! It's one thing to learn the theory and it's another to see it in action.

    • @Professorial_Wolf
      @Professorial_Wolf Месяц назад

      glad you liked it! Feel free to make a video and I’ll post it up on the channel

  • @JuiceCS2
    @JuiceCS2 Месяц назад

    Forgot to tell us to SMASH that like button, subscribe and comment if we have any questions. That is my only complaint.

    • @Professorial_Wolf
      @Professorial_Wolf Месяц назад

      Good thing I have your comment here to let everyone know!

  • @christiansmith8721
    @christiansmith8721 Месяц назад

    yo professor Wolf, love this, thank you.

    • @Professorial_Wolf
      @Professorial_Wolf Месяц назад

      Thank you for your support Christian. Feel free to make a I.t. Video and I will post it!

  • @clipper168
    @clipper168 2 месяца назад

    Is the key to the pig pen Biometric

    • @Professorial_Wolf
      @Professorial_Wolf 2 месяца назад

      No it is from the 18th century

    • @chrisallison121
      @chrisallison121 7 дней назад

      @@Professorial_Wolf They're asking if the example given, the one above you talking, spells out biometric, which it does. Yes clipper you're correct

    • @Professorial_Wolf
      @Professorial_Wolf 6 дней назад

      @@chrisallison121 You are so smart! I misunderstood

  • @user-ce8hq4qg8p
    @user-ce8hq4qg8p 2 месяца назад

    Thanks Professor Wolf

    • @Professorial_Wolf
      @Professorial_Wolf 2 месяца назад

      You're welcome! keep up the studies and you will be the greatest

  • @user-ce8hq4qg8p
    @user-ce8hq4qg8p 2 месяца назад

    Thanks Professor Wolf

    • @Professorial_Wolf
      @Professorial_Wolf 2 месяца назад

      You're welcome! keep learning so you can teach me one day!

  • @user-ce8hq4qg8p
    @user-ce8hq4qg8p 2 месяца назад

    Thanks Professor Wolf

  • @user-ce8hq4qg8p
    @user-ce8hq4qg8p 2 месяца назад

    Thanks Professor Wolf

    • @Professorial_Wolf
      @Professorial_Wolf 2 месяца назад

      You're welcome! If you have any more questions or need further assistance, feel free to ask. I'm here to help!

  • @matthewford5477
    @matthewford5477 3 месяца назад

    I wouldn't mind a short video on the pig pen demonstrated. Thank you for your videos!

    • @Professorial_Wolf
      @Professorial_Wolf 2 месяца назад

      I am very behind on projects, but can put this in the list... OR you can make it!? and I will post it up on the channel so everyone can send their valentines day sweetheart a encrypted message using Pig Pen!

    • @clipper168
      @clipper168 2 месяца назад

      Hi this video told me to comment so ya but it was a good video 🎉

    • @Professorial_Wolf
      @Professorial_Wolf 2 месяца назад

      @@clipper168 you should make a video and ill post it on the channel, and then they can go to your channel

  • @KevinHolland-ii2xb
    @KevinHolland-ii2xb 3 месяца назад

    Why wouldn't "TwoFish" be a correct answer to Question 42? 128 bit block, 128/192/256 key

    • @Professorial_Wolf
      @Professorial_Wolf 3 месяца назад

      TwoFish has a scaling key size that can range from 1 to 256 bits. Commonly used key sizes for twofish is 128/192/256. AES only has the options of 128/192/256.

  • @AlFromPalletTown
    @AlFromPalletTown 3 месяца назад

    Professor Wolf, This video series was very useful. I watched all the cohort videos before this series and I barely failed the PA. (40/60). I sat down and watched this whole playlist, made flashcards and notes of all the bold text. I did better on the PA the second time around and I passed the exam on the first try (all in the same day). I am not saying the cohort videos didn't help, but I wish I had watched your series first. I liked your style of instruction, and I felt like I learned more. I hope to have you as a future professor in my upcoming classes. For students starting intro to cryptography, best of luck! I definitely suggest watching all these videos in the playlist, and reviewing the material in the course chatter!

    • @Professorial_Wolf
      @Professorial_Wolf 3 месяца назад

      Hi thank you for the wonderful compliment @AlFromPalletTown be sure to add me on linkedin. I hope to assist everyone with positions/jobs in the future wherever that may be.

    • @andrewstaples9947
      @andrewstaples9947 17 дней назад

      I'm about to take my second attempt at the exam after only using the Cohort videos (I barely failed it, got a 65%) and have been cramming the Professor Wolf Videos because it seems more focused than the Quizzets!

    • @Professorial_Wolf
      @Professorial_Wolf 17 дней назад

      @@andrewstaples9947 this is the way! (In a Mandalorian voice)

  • @f_if_i_know5049
    @f_if_i_know5049 3 месяца назад

    Thanks Professor Wolf!

  • @f_if_i_know5049
    @f_if_i_know5049 3 месяца назад

    Thanks Professor Wolf!

    • @Professorial_Wolf
      @Professorial_Wolf 3 месяца назад

      thank you for being a wonderful student and learning all the information!

  • @f_if_i_know5049
    @f_if_i_know5049 3 месяца назад

    Thanks Professor Wolf!

    • @Professorial_Wolf
      @Professorial_Wolf 3 месяца назад

      You are the real hero! keep up the good work!

  • @f_if_i_know5049
    @f_if_i_know5049 3 месяца назад

    Thanks Professor Wolf!

    • @Professorial_Wolf
      @Professorial_Wolf 3 месяца назад

      Been very busy working on many projects! just noticed your thanks! thank you for your support

  • @f_if_i_know5049
    @f_if_i_know5049 3 месяца назад

    Thanks Professor Wolf

  • @f_if_i_know5049
    @f_if_i_know5049 3 месяца назад

    Thanks Professor Wolf?

  • @JaredFL
    @JaredFL 3 месяца назад

    RC DN

  • @calebanderson2428
    @calebanderson2428 3 месяца назад

    This is great. Love the series, broken down in an easy to consume format. Thanks!

  • @johnwilkins3896
    @johnwilkins3896 3 месяца назад

    This has helped out a lot the text and others confused me

    • @Professorial_Wolf
      @Professorial_Wolf 3 месяца назад

      Let me know if you have any questions on any other areas. I will be posting some recruiter’s eventually so everyone can get interviews and potentially their first job

  • @mikeowens5908
    @mikeowens5908 3 месяца назад

    please explain pre image attack in a different if possible

    • @Professorial_Wolf
      @Professorial_Wolf 3 месяца назад

      Please set up an appointment with me and we can go over the topic. I will make an additional video to explain in a different way. Just very busy working on a 60m+ project for my company

  • @thebaldcaillou5000
    @thebaldcaillou5000 3 месяца назад

    Hey Professor! Is there a place to download the slides, I am a WGU student. Thank you for the videos!

    • @Professorial_Wolf
      @Professorial_Wolf 3 месяца назад

      Please send me a email and I can email any particular one to you. The cryptography PowerPoint has all the information, condensed

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 4 месяца назад

    So glad you are starting a Sec+ series. Thanks Prof Wolf!!

  • @johnny5941
    @johnny5941 4 месяца назад

    Can it be hiring managers and ceo's in general? Not just tech related companies?

    • @Professorial_Wolf
      @Professorial_Wolf 4 месяца назад

      Yes, this works in any industry. If they deny you and then you build up skills sometimes they still won’t have a spot for you. Ask for a referral then and keep them updated (treat them as a mentor)

    • @johnny5941
      @johnny5941 4 месяца назад

      @@Professorial_Wolf what I meant was that technical roles exists in companies that do not sell technical services. Is it ideal to contact an administrator to become a programmer, or I would have a significantly stronger chance of getting a job if I contacted someone who actually does technical things.

    • @Professorial_Wolf
      @Professorial_Wolf 4 месяца назад

      @@johnny5941 The Non-management is less likely to assist you. Focus on management/ higher leadership within the department and the recruiters. If you reach out to a person working a admin or programing role say " I am interested in learning more about the roles within your department can you point me in the direction of the manager?" send me a request on linkedin and we can set up a call and I can give you some coaching on your personal situation. www.linkedin.com/in/paris-wolf/ the cost is be sure to subscribe!

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 4 месяца назад

    Outstanding info, thank you so much.

    • @Professorial_Wolf
      @Professorial_Wolf 4 месяца назад

      Glad it was helpful! Stay tuned as I will be posting many more techniques and setting up qualified candidates with top tier recruiters

  • @user-ce6jc8fl5n
    @user-ce6jc8fl5n 4 месяца назад

    So how exactly does it work when an exchange of a fraction of a bitcoin takes place?

    • @Professorial_Wolf
      @Professorial_Wolf 4 месяца назад

      In addition to the block reward, miners also receive transaction fees associated with the transactions included in the block they mined. When users send Bitcoin transactions, they have the option to include a transaction fee, which is paid to the miner who successfully mines the block containing their transaction. Transaction fees are typically voluntary, but users may choose to include them to incentivize miners to prioritize their transactions.

  • @wholeheartedwe2091
    @wholeheartedwe2091 4 месяца назад

    Hey Paris, would recommend that you increase the volume of the recording a bit. I'm on full volume and I can hear you, but if I'm not in a silent environment I lose your voice.

    • @Professorial_Wolf
      @Professorial_Wolf 4 месяца назад

      Roger I will buy a professional mic, and redo the pre-assessments after completing each chapter

    • @Professorial_Wolf
      @Professorial_Wolf 4 месяца назад

      I got a Mic for all the videos moving forward now

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 4 месяца назад

    I have never understood this type of attack before your explanation. Thanks Professor!!

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 4 месяца назад

    This clarifies so much, thank you!!

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 4 месяца назад

    Great vid!

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 4 месяца назад

    Keep these gems coming! The shorter format helps me focus

    • @Professorial_Wolf
      @Professorial_Wolf 2 месяца назад

      I do my best to get straight to the point

    • @towely
      @towely 3 дня назад

      It helps me feel like I'm actually getting somewhere

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 4 месяца назад

    Quick and to the point, thanks Professor!

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 4 месяца назад

    Thank you for this!! I couldn’t find any solid coverage on this topic until now. Keep up the great work!!

    • @Professorial_Wolf
      @Professorial_Wolf 2 месяца назад

      Glad it was helpful! This is an area most students have found difficult

  • @OnenThomas-cw7py
    @OnenThomas-cw7py 4 месяца назад

    Regina thomas ❤😂🎉😢😮😅😊

    • @Professorial_Wolf
      @Professorial_Wolf 4 месяца назад

      Awesome! these videos bring a wave of emotions. ^

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 5 месяцев назад

    Very good coverage of this topic, thank you!

    • @Professorial_Wolf
      @Professorial_Wolf 5 месяцев назад

      Glad you liked it! Let me know if you want any specific topics covered or to go deeper into any particular subject