- Видео 71
- Просмотров 239 758
Professor Wolf
США
Добавлен 31 янв 2024
Current content: SSCP, How to get a Job, Cryptography
Видео
Cryptography, Cryptanalysis, Cryptology, Cleartext, Ciphertext
Просмотров 2,1 тыс.3 месяца назад
Cryptography, Cryptanalysis, Cryptology, Cleartext, Ciphertext
CIA Triad and PKI
Просмотров 1,4 тыс.3 месяца назад
CIA Triad and how it relates to PKI/Digital Signatures Confidentiality Integrity Availability
GDPR, HIPPA, PCI DSS, SOX Sarbanes
Просмотров 1163 месяца назад
GDPR General Data Protection Regulation HIPPA Health Insurance Portability and Accountability Act PCI-DSS Payment Card Industry Data Security Standard SOX The Sarbanes-Oxley Act
MTBF, MTTR, MTTF, RTO, RPO
Просмотров 1773 месяца назад
MTBF, MTTR, MTTF, RTO, RPO Mean Time Between Failure Mean Time To Recovery Mean Time to Failure Recovery Time Objective Recovery Point Objective
Password Technical Controls
Просмотров 994 месяца назад
Password Complexity, Password Length, Password Aging & Rotation, Password Hashing, Password Lockout, Password MFA
Least Privilege, Segregation of Duties
Просмотров 1974 месяца назад
Paris Wolf teaches SSCP ISC2 Least Privilege, Segregation of Duties
CIA Triad, Accountability, Privacy, Non-Repudiation, Hashing Lab
Просмотров 3454 месяца назад
Paris Wolf CIA Triad, Accountability, Privacy, Non-Repudiation, Hashing Lab
CryptoGameShow
Просмотров 1,2 тыс.4 месяца назад
Paris Wolf Represents Cryptography going through a series of questions to earn money.
Comptia Competition SEC + 1.4
Просмотров 1646 месяцев назад
Paris Wolf CompTIA Competition submission. Reviewing objectives 1.4 PKI, Public Key, Private Key, Asymmetric Encryption, RSA, Key Escrow, Key Exchange Diffie-Hellman, Transport Layer Security, Symmetric Encryption, AES, Key Length, Encryption, Full Disk Encryption, Partition, Volume, File Encryption, Database, Record, Bonus Content #CompTIACastingCall #ad #CompTIAContest
AI Learning
Просмотров 1066 месяцев назад
An introduction to AI focusing on building a Binary AI. Cancer File: github.com/VoidKnight-AI/Binary-AI Google CoLab: colab.research.google.com/ Pandas: pandas.pydata.org/ NumPy: numpy.org/ TensorFlow: www.tensorflow.org/ SKLearn: scikit-learn.org/stable/index.html
Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman
Просмотров 4 тыс.6 месяцев назад
Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman
Encryption Full Disk, Partition, Volume, Record, Database
Просмотров 2206 месяцев назад
Encryption Full Disk, Partition, Volume, Record, Database
Change management, technical implementations, Documentation, version control
Просмотров 2059 месяцев назад
Change management, technical implementations, Documentation, version control
GAP Analysis, Zero Trust, Control Plane, Data Plane
Просмотров 4619 месяцев назад
GAP Analysis, Zero Trust, Control Plane, Data Plane
how to get your application pulled without knowing anyone
Просмотров 45410 месяцев назад
how to get your application pulled without knowing anyone
Cert types ,Digital Certificate stages, states of revocation
Просмотров 3,6 тыс.10 месяцев назад
Cert types ,Digital Certificate stages, states of revocation
One, Two Way Authentication, EndtoEnd and Intermediate Authentication, Types of Authentication
Просмотров 3,6 тыс.10 месяцев назад
One, Two Way Authentication, EndtoEnd and Intermediate Authentication, Types of Authentication
CBC-MAC CCM, Windows hashing, Linux hashing
Просмотров 3,7 тыс.10 месяцев назад
CBC-MAC CCM, Windows hashing, Linux hashing
Hey, I'm currently in your cryptography course. One of the quizzets counted my answer wrong when I selected the option for IDEA having >17 rounds, and instead said the correct answer was <17 rounds. Not sure which is supposed to be right, but a Google search led me to believe the quizzet was correct and IDEA has <17 rounds not >17.
Professor Wolf, these are incredibly helpful, thank you!
Thank you for your support!
Professor Wolf always got the cleanest fits, thanks for the knowledge!
Any time! Just finished my cryptography text book Cryptography and Cyber Security in the Department of Defense. Excited to make videos on these
on the CFB slide there is the text at the top saying the ciphertext is not used as input to encrypt subsequent blocks, but I am wondering if that is an element that should only appear on the OFB slide? My chatbots are trying to tell me that CFB does use the ciphertext as input for subsequent blocks.
CFB takes the XOR as input into the block and OFB takes from the Cipher Stage as input into the next block.
The first minute of content cleared up so much for me. Thank you 😊
Glad it was helpful!
"The answer to this question is......What's the answer to this question?" lol
Smash that subscribe button! Thanks for another video!
Thanks for the sub! Be sure to add me on LinkedIn for job postings
what is the XOR is it another key?
A XOR is a random Initilization vector that is the same length of the plaintext. It is XOR'd (binary math operation) with another set of data. it is not encryption but helps create randomness. See XOR video to see how the math works.
Hello, Are there not videos for chapter 5?
It’s combined with other chapters as the concepts only make sense combined with other areas
Used your videos for cryptography. Any other suggestion for sscp?
Many people use the Linkedin learning SSCP training. I wont have my videos for sscp for a long time due to writing a cryptography textbook at the moment
Thank you so much for putting this course together man. You are the best
Any time!
Would you consider adding a couple seconds to the end of the video as an outro? I often want to pause and review the text when you’re done talking but they immediately jump to the next video before I realize they are over. Thanks!
Good idea! Currently building a new curriculum for cryptography and will remake all videos
whats the difference between apr1 and pbkdf2?
APR1 is a password hashing algorithm. It's a variation of the MD5. (used in older systems) PBKDF2 is a key derivation function used for securely hashing passwords and generating encryption keys from passwords. It applies a hashing algorithm such as SHA 256 repeatedly to a password and a salt, combined with a configurable number of iterations. Much more secure then APR1. PBKDF2 is still widely used
I'm confused on what the difference is between cipher feedback and output feedback. I missing something ...
One takes from the cipher stage and the other from the XOR stage. This output is used for the IV of the next block
These videos are so helpful! Thank you!
also I may be wrong but I think the first time you mention digital certificates, i believe the title it say digital signatures, I may be wrong though.
Glad you like them! Feel free to make any additional requests or make a video and I will put it up
Can I get a copy of the slides for my studies ?
Can you email me looking me up under Paris Wolf
Hi! Have you heard of the death of Ray Rivera? The family believe he was a Freemason, which uses cryptic messages. He was found dead with a weird letter tapped to the back of his computer screen. Would you be able to understand it? He mentioned random movie titles and such. It is on episode 1 of Unsolved Mysteries on Netflix.
I forgot to add, the Freemasons are known to use the Masonic cipher.
I have not! I don’t own a t.v. at the moment. I will have to take a look at the letter break the encryption, solve the case, and hopefully it will review some secrets
This series was extremely helpful thank you Professor Wolf!
You're very welcome! Be sure to set an appointment if you have any questions!
Thank You
You're welcome! Feel free to suggest/ make a video
Very helpful, clarifying terms that get thrown around a lot!
Glad to hear it!
Nicely done! Now I get the CIA triad, thank you!
Thanks! just for everyone's reference CIA triad stands for Confidentiality, Integrity, Availability... not the secret agency
Short and to the point. God job!
Im looking forward to when we can just upload information directly into the brain fy 3077
Great video, I didn’t know any of this!
We must continue to spread the word of these Laws so all know
Finally, these terms make sense. Thanks Prof. Wolf!
Hipaa not hippa
You are now in charge of all slides
Wow! I appreciate all these in-depth answers and thorough videos. Hope you make it big on RUclips!
I appreciate that! Hopefully can upgrade the equipment in the near future for higher quality videos
Do you have that review document that he kept referring to?
Let me ask him. Can you email me
Another outstanding video, thanks Professor Wolf!
Thank you Clint Dawg. With a last name like Dawg I wonder if we are distantly related
Man your vids pack so much knowledge in such a short time! Keep em coming
Glad you like them! I have 1000 more im working on
Watched all of your videos and skimmed the book in regards to intro to cryptography and was able to pass the assessment! Thank you for this.
Fantastic! Be sure to send an invite on LinkedIn
Its impressive how much knowledge you have fit into one minute
Just wait until we can neural uplink a terabyte of data a second! Fy3024!
Professor wolf, the only man giving Steve Harvey a run for his money in the suit game!
Awh yes my nemesis Steve Harvey. In the end only one can be left standing in a suit. #voldermort #harrypotter
And to think I told my Highschool teacher I would never need to know math...... Thanks Professor Wolf!
I bet they told you those essays were important too…Now we have chat gpt!
Oh, this just made me realize that figuring out hex is the same as IP addresses in decimal. Adding 128, 64, 36, 16 , 8, 4, 2, 1 if the bit for it is on!
Is this playlist specifically for Intro to Cryptography @wgu?
Completely unrelated to cryptography WGU. I have been told it just happens to perfectly align. I would recommend taking notes on everything bold if I was taking a test
@@Professorial_Wolfim confused as to why i see your name on the course chatter recommending people to watch these but you say its unrelated??
@@F1ukez This is a third party website that just happens to teach similar content. Be sure to take notes on every video
Thank you so much for these videos! They are incredibly helpful
You're so welcome! Be sure to pass the test now so I can claim to be the number one teacher with the number one student!
Is MD5 the only technique that can have a hash collision?
Any hash can have a collision. MD5 would be more common the SHA collision because it’s less complex.
The purpose of a digital certificate is to "validate the integrity and authenticity" of a service with respect to an issuer. It's not just to "bind" a public key to a service (whatever "bind" means with your definition). Not sure who made these questions, but some of them are 💩
I made these! Send some better questions over and I’ll make another question series called bonus practice questions. Or feel free to make a video and I’ll post it on the channel. Digital signature is used to validate the authenticity and integrity. Digital certificate binds
@@Professorial_Wolf "Digital certificate" is another way to say "public key certificate." The standard for CAs and certificates were standardized by the International Telecommunication Union in 1988 with the document "Information Technology - Open Systems Interconnection - The Directory: Authentication Framework." This document defined "user certificate; public key certificate; certificate" (in section 1 part 3.3.3) as "The public keys of a user, together with some other information, *rendered unforgeable by encipherment* with the private key of the certification authority which issued it." The only other defined certificate (aside from the CA's) is the "attribute certificate", defined separately in part 3.3.1. Its definition reads "A set of attributes of a user together with some other information, *rendered unforgeable by the digital signature* created using the private key of the certification authority which issued it." Furthermore, the certificate format represented as the ASN.1 data type *includes* the signature as part of the certificate (viewable in section 3 part 8, in "Obtaining a user’s public key"). If a signature accomplishes the goal of validating authenticity, it follows that any definition of an item including a signature can inherit this property as well. No need for bonus questions or a follow-up video to address what I see as a clearly incorrect answer. Accepting what you have marked as the sole answer ignores the ability of a cert to validate the authenticity of the presenting service with respect to an issuer.
the explanation in the video he gave makes sense. He told us the integrity and auth happens with the digital signature that is within the digital certificate...
@@MrOthellonc 9:34 is a very clear "no". Also my longer comment about the original specification introducing certs was seemingly deleted which indicates bad faith. I take teaching seriously and hold those who choose to do so accountable for doing the proper research needed before disseminating information to aspiring students
I made it to the end! Hey man, just wanted to thank you for all of the videos they were extremely good and my favorite way to learn. I'm feeling optimistic for the test since I turned every 'bold' word you went over into a notecard. I uh, genuinely appreciate the effort you put into these.
Glad you like them! Let me know how the test goes, and if there are any additional recommendations for videos to make after
Hey just thought id mention that the hashing is stored in the etc/shadow file and not the passwd
Let me double check and I will get back to you. I believe off the top of my head it was originally stored in the passwd and then moved to the etc/shadow file in later years.
@@Professorial_Wolf yes and you stayed this correctly in one of your other videos. Just don't want anyone to miss that on a Linux test cause it always comes up as a trick question
I just passed the assessment on my first attempt thanks to your series. I appreciate your help professor!
This is such an impressively simple concept but it just seems so hard for people to wrap their heads around, myself included. This broke it down just enough to make it stick.
I do my best
Great videos! They are really helping me with this class. I am curious about one thing though: Why do asymmetric keys have to be longer to have the same security as symmetric keys? Is it because they take longer to process?
it is a one way math formula and it has to use large key because at the same size their are only so many possibilities for prime numbers/ unique numbers versus symmetric that could use any of the numbers in their math equation. With a one way math formula you are forced to use these prime numbers so the message can not be easily cracked
@@Professorial_Wolf That makes sense. Thank you!
I like that you say being an engineer means looking alot of stuff up...I'm a computer tech for a school district (our title, basically desktop support) and we joke in our team that the secret of our jobs is we are just better at googling than others.
Yes it is a great learning opportunity walking through the fire.
whats with the hard cut on Question 16?
my second video ever created. bad editing! I should remake it... you want to make it and I will post it up?!? I can send you the slides
@@Professorial_Wolf was the answer the bottom image?
Full Code: # Import Libraries import pandas as pd import numpy as np import tensorflow as tf from sklearn.model_selection import train_test_split # Load the dataset dataset = pd.read_csv('cancer.csv') x = dataset.drop(columns=["diagnosis(1=m, 0=b)"]) y = dataset["diagnosis(1=m, 0=b)"] # Split the dataset into training and test sets x_train, x_test, y_train, y_test = train_test_split(x, y, test_size=0.2) # Build and train the model model = tf.keras.models.Sequential() model.add(tf.keras.layers.Dense(256, input_shape=x_train.shape[1:], activation='sigmoid')) model.add(tf.keras.layers.Dense(256, activation='sigmoid')) model.add(tf.keras.layers.Dense(1, activation='sigmoid')) model.compile(optimizer='adam', loss='binary_crossentropy', metrics=['accuracy']) model.fit(x_train, y_train, epochs=1000) # Evaluate the model on the test set loss, accuracy = model.evaluate(x_test, y_test) print(f"Accuracy on the test set: {accuracy}") # Prepare and predict the new tumor data new_tumor_data = np.array([[13.54, 14.36, 87.46, 566.3, 0.09779, 0.08129, 0.06664, 0.04781, 0.1885, 0.05766, 0.2699, 0.7886, 2.058, 23.56, 0.008462, 0.0146, 0.02387, 0.01315, 0.0198, 0.0023, 15.11, 19.26, 99.7, 711.2, 0.144, 0.1773, 0.239, 0.1288, 0.2977, 0.07259]]) prediction = model.predict(new_tumor_data) print(f"Prediction for the new tumor data: {prediction}") # Determine the diagnosis based on the prediction threshold = 0.5 accuracy_rating = accuracy diagnosis = "malignant" if prediction >= threshold else "benign" print(f"The predicted diagnosis is: {diagnosis}. Accuracy: {accuracy_rating}")
Oh no everything is on the left hand side of the screen. who would do this!
I've learned more in these 4 videos than I did listening to the whole D334 book summary
Thank you Rob
@@Professorial_Wolf Just took my D334 Cryptography test after watching your series twice and passed by a good margin. I took the pre assessment when I started and was no where near the cutoff. 4 days and done thanks again Wolf!
@@Rob-uj8bo absolutely.highest amount of passes in the I.T. Courses over all instructors
@@Rob-uj8boall you did was watch his videos?
Thanks Professor wolf!
Thank you for your support my liege
Thank you for sharing your knowledge
So nice of you. Consider making an i.t. Video and I will post it up!