AI Learning
19:28
Ай бұрын
1.2 Physical security, Honeypot
2:37
1.2 CIA, Non Repudiation, AAA
5:26
1.1 Control Types
3:57
4 ай бұрын
1.0 Security Controls
3:58
4 ай бұрын
Cryptocracking
2:06
5 ай бұрын
key escrow, anobus, AES weakness
1:01
IKE, TOR
1:31
5 ай бұрын
ChaCha20, A5 cipher
0:48
5 ай бұрын
Frequency analysis
0:23
5 ай бұрын
Light-weight cryptography
0:33
5 ай бұрын
Bitcoin, Ethereum
2:21
5 ай бұрын
Hashing Classification, LM, NTLM
1:33
LDAP, PHPass, Cisco Hashes
1:25
5 ай бұрын
Rainbow Table, HMAC, APR1
1:52
5 ай бұрын
Tunnel, Transport, AH, ESP
3:40
5 ай бұрын
Salt, Bcrypt
2:33
5 ай бұрын
Hashing
1:11
5 ай бұрын
Пікірлер
@miradwyn
@miradwyn Күн бұрын
Oh, this just made me realize that figuring out hex is the same as IP addresses in decimal. Adding 128, 64, 36, 16 , 8, 4, 2, 1 if the bit for it is on!
@user-xb9dr5lh8b
@user-xb9dr5lh8b 2 күн бұрын
Is this playlist specifically for Intro to Cryptography @wgu?
@Professorial_Wolf
@Professorial_Wolf 2 күн бұрын
Completely unrelated to cryptography WGU. I have been told it just happens to perfectly align. I would recommend taking notes on everything bold if I was taking a test
@Megan-bl5qm
@Megan-bl5qm 11 күн бұрын
Thank you so much for these videos! They are incredibly helpful
@Professorial_Wolf
@Professorial_Wolf 11 күн бұрын
You're so welcome! Be sure to pass the test now so I can claim to be the number one teacher with the number one student!
@Thebootstrapped
@Thebootstrapped 11 күн бұрын
Is MD5 the only technique that can have a hash collision?
@Professorial_Wolf
@Professorial_Wolf 11 күн бұрын
Any hash can have a collision. MD5 would be more common the SHA collision because it’s less complex.
@y4550
@y4550 20 күн бұрын
The purpose of a digital certificate is to "validate the integrity and authenticity" of a service with respect to an issuer. It's not just to "bind" a public key to a service (whatever "bind" means with your definition). Not sure who made these questions, but some of them are 💩
@Professorial_Wolf
@Professorial_Wolf 19 күн бұрын
I made these! Send some better questions over and I’ll make another question series called bonus practice questions. Or feel free to make a video and I’ll post it on the channel. Digital signature is used to validate the authenticity and integrity. Digital certificate binds
@y4550
@y4550 19 күн бұрын
​@@Professorial_Wolf "Digital certificate" is another way to say "public key certificate." The standard for CAs and certificates were standardized by the International Telecommunication Union in 1988 with the document "Information Technology - Open Systems Interconnection - The Directory: Authentication Framework." This document defined "user certificate; public key certificate; certificate" (in section 1 part 3.3.3) as "The public keys of a user, together with some other information, *rendered unforgeable by encipherment* with the private key of the certification authority which issued it." The only other defined certificate (aside from the CA's) is the "attribute certificate", defined separately in part 3.3.1. Its definition reads "A set of attributes of a user together with some other information, *rendered unforgeable by the digital signature* created using the private key of the certification authority which issued it." Furthermore, the certificate format represented as the ASN.1 data type *includes* the signature as part of the certificate (viewable in section 3 part 8, in "Obtaining a user’s public key"). If a signature accomplishes the goal of validating authenticity, it follows that any definition of an item including a signature can inherit this property as well. No need for bonus questions or a follow-up video to address what I see as a clearly incorrect answer. Accepting what you have marked as the sole answer ignores the ability of a cert to validate the authenticity of the presenting service with respect to an issuer.
@geeca85
@geeca85 21 күн бұрын
I made it to the end! Hey man, just wanted to thank you for all of the videos they were extremely good and my favorite way to learn. I'm feeling optimistic for the test since I turned every 'bold' word you went over into a notecard. I uh, genuinely appreciate the effort you put into these.
@Professorial_Wolf
@Professorial_Wolf 21 күн бұрын
Glad you like them! Let me know how the test goes, and if there are any additional recommendations for videos to make after
@thrillhouse4784
@thrillhouse4784 26 күн бұрын
Hey just thought id mention that the hashing is stored in the etc/shadow file and not the passwd
@Professorial_Wolf
@Professorial_Wolf 26 күн бұрын
Let me double check and I will get back to you. I believe off the top of my head it was originally stored in the passwd and then moved to the etc/shadow file in later years.
@thrillhouse4784
@thrillhouse4784 25 күн бұрын
@@Professorial_Wolf yes and you stayed this correctly in one of your other videos. Just don't want anyone to miss that on a Linux test cause it always comes up as a trick question
@spartansoldier46
@spartansoldier46 26 күн бұрын
I just passed the assessment on my first attempt thanks to your series. I appreciate your help professor!
@towely
@towely Ай бұрын
This is such an impressively simple concept but it just seems so hard for people to wrap their heads around, myself included. This broke it down just enough to make it stick.
@Professorial_Wolf
@Professorial_Wolf 28 күн бұрын
I do my best
@Megan-bl5qm
@Megan-bl5qm Ай бұрын
Great videos! They are really helping me with this class. I am curious about one thing though: Why do asymmetric keys have to be longer to have the same security as symmetric keys? Is it because they take longer to process?
@Professorial_Wolf
@Professorial_Wolf Ай бұрын
it is a one way math formula and it has to use large key because at the same size their are only so many possibilities for prime numbers/ unique numbers versus symmetric that could use any of the numbers in their math equation. With a one way math formula you are forced to use these prime numbers so the message can not be easily cracked
@Megan-bl5qm
@Megan-bl5qm Ай бұрын
@@Professorial_Wolf That makes sense. Thank you!
@andrewstaples9947
@andrewstaples9947 Ай бұрын
I like that you say being an engineer means looking alot of stuff up...I'm a computer tech for a school district (our title, basically desktop support) and we joke in our team that the secret of our jobs is we are just better at googling than others.
@Professorial_Wolf
@Professorial_Wolf Ай бұрын
Yes it is a great learning opportunity walking through the fire.
@andrewstaples9947
@andrewstaples9947 Ай бұрын
whats with the hard cut on Question 16?
@Professorial_Wolf
@Professorial_Wolf Ай бұрын
my second video ever created. bad editing! I should remake it... you want to make it and I will post it up?!? I can send you the slides
@Professorial_Wolf
@Professorial_Wolf Ай бұрын
Full Code: # Import Libraries import pandas as pd import numpy as np import tensorflow as tf from sklearn.model_selection import train_test_split # Load the dataset dataset = pd.read_csv('cancer.csv') x = dataset.drop(columns=["diagnosis(1=m, 0=b)"]) y = dataset["diagnosis(1=m, 0=b)"] # Split the dataset into training and test sets x_train, x_test, y_train, y_test = train_test_split(x, y, test_size=0.2) # Build and train the model model = tf.keras.models.Sequential() model.add(tf.keras.layers.Dense(256, input_shape=x_train.shape[1:], activation='sigmoid')) model.add(tf.keras.layers.Dense(256, activation='sigmoid')) model.add(tf.keras.layers.Dense(1, activation='sigmoid')) model.compile(optimizer='adam', loss='binary_crossentropy', metrics=['accuracy']) model.fit(x_train, y_train, epochs=1000) # Evaluate the model on the test set loss, accuracy = model.evaluate(x_test, y_test) print(f"Accuracy on the test set: {accuracy}") # Prepare and predict the new tumor data new_tumor_data = np.array([[13.54, 14.36, 87.46, 566.3, 0.09779, 0.08129, 0.06664, 0.04781, 0.1885, 0.05766, 0.2699, 0.7886, 2.058, 23.56, 0.008462, 0.0146, 0.02387, 0.01315, 0.0198, 0.0023, 15.11, 19.26, 99.7, 711.2, 0.144, 0.1773, 0.239, 0.1288, 0.2977, 0.07259]]) prediction = model.predict(new_tumor_data) print(f"Prediction for the new tumor data: {prediction}") # Determine the diagnosis based on the prediction threshold = 0.5 accuracy_rating = accuracy diagnosis = "malignant" if prediction >= threshold else "benign" print(f"The predicted diagnosis is: {diagnosis}. Accuracy: {accuracy_rating}")
@Rob-uj8bo
@Rob-uj8bo 2 ай бұрын
I've learned more in these 4 videos than I did listening to the whole D334 book summary
@Professorial_Wolf
@Professorial_Wolf 2 ай бұрын
Thank you Rob
@Rob-uj8bo
@Rob-uj8bo 2 ай бұрын
@@Professorial_Wolf Just took my D334 Cryptography test after watching your series twice and passed by a good margin. I took the pre assessment when I started and was no where near the cutoff. 4 days and done thanks again Wolf!
@Professorial_Wolf
@Professorial_Wolf Ай бұрын
@@Rob-uj8bo absolutely.highest amount of passes in the I.T. Courses over all instructors
@rkb3991
@rkb3991 27 күн бұрын
@@Rob-uj8boall you did was watch his videos?
@olafharoldsonnii4713
@olafharoldsonnii4713 2 ай бұрын
Thanks Professor wolf!
@Professorial_Wolf
@Professorial_Wolf 2 ай бұрын
Thank you for your support my liege
@jefferyjohnson1323
@jefferyjohnson1323 2 ай бұрын
Thank you for sharing your knowledge
@Professorial_Wolf
@Professorial_Wolf 2 ай бұрын
So nice of you. Consider making an i.t. Video and I will post it up!
@jefferyjohnson1323
@jefferyjohnson1323 2 ай бұрын
Thank you 🙏
@Professorial_Wolf
@Professorial_Wolf 2 ай бұрын
Any time!
@jefferyjohnson1323
@jefferyjohnson1323 2 ай бұрын
Thank you 🙏
@Professorial_Wolf
@Professorial_Wolf 2 ай бұрын
Absolutely
@hareboy12345
@hareboy12345 2 ай бұрын
I liked how you explained the Get-FileHash. Thanks for that! It's one thing to learn the theory and it's another to see it in action.
@Professorial_Wolf
@Professorial_Wolf 2 ай бұрын
glad you liked it! Feel free to make a video and I’ll post it up on the channel
@JuiceCS2
@JuiceCS2 2 ай бұрын
Forgot to tell us to SMASH that like button, subscribe and comment if we have any questions. That is my only complaint.
@Professorial_Wolf
@Professorial_Wolf 2 ай бұрын
Good thing I have your comment here to let everyone know!
@christiansmith8721
@christiansmith8721 2 ай бұрын
yo professor Wolf, love this, thank you.
@Professorial_Wolf
@Professorial_Wolf 2 ай бұрын
Thank you for your support Christian. Feel free to make a I.t. Video and I will post it!
@clipper168
@clipper168 3 ай бұрын
Is the key to the pig pen Biometric
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
No it is from the 18th century
@chrisallison121
@chrisallison121 Ай бұрын
@@Professorial_Wolf They're asking if the example given, the one above you talking, spells out biometric, which it does. Yes clipper you're correct
@Professorial_Wolf
@Professorial_Wolf Ай бұрын
@@chrisallison121 You are so smart! I misunderstood
@user-ce8hq4qg8p
@user-ce8hq4qg8p 3 ай бұрын
Thanks Professor Wolf
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
You're welcome! keep up the studies and you will be the greatest
@user-ce8hq4qg8p
@user-ce8hq4qg8p 3 ай бұрын
Thanks Professor Wolf
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
You're welcome! keep learning so you can teach me one day!
@user-ce8hq4qg8p
@user-ce8hq4qg8p 3 ай бұрын
Thanks Professor Wolf
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
Any time
@user-ce8hq4qg8p
@user-ce8hq4qg8p 3 ай бұрын
Thanks Professor Wolf
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
You're welcome! If you have any more questions or need further assistance, feel free to ask. I'm here to help!
@matthewford5477
@matthewford5477 4 ай бұрын
I wouldn't mind a short video on the pig pen demonstrated. Thank you for your videos!
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
I am very behind on projects, but can put this in the list... OR you can make it!? and I will post it up on the channel so everyone can send their valentines day sweetheart a encrypted message using Pig Pen!
@clipper168
@clipper168 3 ай бұрын
Hi this video told me to comment so ya but it was a good video 🎉
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
@@clipper168 you should make a video and ill post it on the channel, and then they can go to your channel
@KevinHolland-ii2xb
@KevinHolland-ii2xb 4 ай бұрын
Why wouldn't "TwoFish" be a correct answer to Question 42? 128 bit block, 128/192/256 key
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
TwoFish has a scaling key size that can range from 1 to 256 bits. Commonly used key sizes for twofish is 128/192/256. AES only has the options of 128/192/256.
@AlFromPalletTown
@AlFromPalletTown 4 ай бұрын
Professor Wolf, This video series was very useful. I watched all the cohort videos before this series and I barely failed the PA. (40/60). I sat down and watched this whole playlist, made flashcards and notes of all the bold text. I did better on the PA the second time around and I passed the exam on the first try (all in the same day). I am not saying the cohort videos didn't help, but I wish I had watched your series first. I liked your style of instruction, and I felt like I learned more. I hope to have you as a future professor in my upcoming classes. For students starting intro to cryptography, best of luck! I definitely suggest watching all these videos in the playlist, and reviewing the material in the course chatter!
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
Hi thank you for the wonderful compliment @AlFromPalletTown be sure to add me on linkedin. I hope to assist everyone with positions/jobs in the future wherever that may be.
@andrewstaples9947
@andrewstaples9947 Ай бұрын
I'm about to take my second attempt at the exam after only using the Cohort videos (I barely failed it, got a 65%) and have been cramming the Professor Wolf Videos because it seems more focused than the Quizzets!
@Professorial_Wolf
@Professorial_Wolf Ай бұрын
@@andrewstaples9947 this is the way! (In a Mandalorian voice)
@f_if_i_know5049
@f_if_i_know5049 4 ай бұрын
Thanks Professor Wolf!
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
My pleasure!
@f_if_i_know5049
@f_if_i_know5049 4 ай бұрын
Thanks Professor Wolf!
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
thank you for being a wonderful student and learning all the information!
@f_if_i_know5049
@f_if_i_know5049 4 ай бұрын
Thanks Professor Wolf!
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
You are the real hero! keep up the good work!
@f_if_i_know5049
@f_if_i_know5049 4 ай бұрын
Thanks Professor Wolf!
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
Been very busy working on many projects! just noticed your thanks! thank you for your support
@f_if_i_know5049
@f_if_i_know5049 4 ай бұрын
Thanks Professor Wolf
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
It was a honor to work with you!
@f_if_i_know5049
@f_if_i_know5049 4 ай бұрын
Thanks Professor Wolf?
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
Thats me! be sure to add me on linkedin
@JaredFL
@JaredFL 4 ай бұрын
RC DN
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
whats that!? RC DN?
@calebanderson2428
@calebanderson2428 4 ай бұрын
This is great. Love the series, broken down in an easy to consume format. Thanks!
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
Glad you enjoyed it!
@johnwilkins3896
@johnwilkins3896 4 ай бұрын
This has helped out a lot the text and others confused me
@Professorial_Wolf
@Professorial_Wolf 4 ай бұрын
Let me know if you have any questions on any other areas. I will be posting some recruiter’s eventually so everyone can get interviews and potentially their first job
@mikeowens5908
@mikeowens5908 4 ай бұрын
please explain pre image attack in a different if possible
@Professorial_Wolf
@Professorial_Wolf 4 ай бұрын
Please set up an appointment with me and we can go over the topic. I will make an additional video to explain in a different way. Just very busy working on a 60m+ project for my company
@thebaldcaillou5000
@thebaldcaillou5000 4 ай бұрын
Hey Professor! Is there a place to download the slides, I am a WGU student. Thank you for the videos!
@Professorial_Wolf
@Professorial_Wolf 4 ай бұрын
Please send me a email and I can email any particular one to you. The cryptography PowerPoint has all the information, condensed
@ClintDawgMillionaire
@ClintDawgMillionaire 5 ай бұрын
So glad you are starting a Sec+ series. Thanks Prof Wolf!!
@johnny5941
@johnny5941 5 ай бұрын
Can it be hiring managers and ceo's in general? Not just tech related companies?
@Professorial_Wolf
@Professorial_Wolf 5 ай бұрын
Yes, this works in any industry. If they deny you and then you build up skills sometimes they still won’t have a spot for you. Ask for a referral then and keep them updated (treat them as a mentor)
@johnny5941
@johnny5941 5 ай бұрын
@@Professorial_Wolf what I meant was that technical roles exists in companies that do not sell technical services. Is it ideal to contact an administrator to become a programmer, or I would have a significantly stronger chance of getting a job if I contacted someone who actually does technical things.
@Professorial_Wolf
@Professorial_Wolf 5 ай бұрын
@@johnny5941 The Non-management is less likely to assist you. Focus on management/ higher leadership within the department and the recruiters. If you reach out to a person working a admin or programing role say " I am interested in learning more about the roles within your department can you point me in the direction of the manager?" send me a request on linkedin and we can set up a call and I can give you some coaching on your personal situation. www.linkedin.com/in/paris-wolf/ the cost is be sure to subscribe!
@ClintDawgMillionaire
@ClintDawgMillionaire 5 ай бұрын
Outstanding info, thank you so much.
@Professorial_Wolf
@Professorial_Wolf 5 ай бұрын
Glad it was helpful! Stay tuned as I will be posting many more techniques and setting up qualified candidates with top tier recruiters
@user-ce6jc8fl5n
@user-ce6jc8fl5n 5 ай бұрын
So how exactly does it work when an exchange of a fraction of a bitcoin takes place?
@Professorial_Wolf
@Professorial_Wolf 5 ай бұрын
In addition to the block reward, miners also receive transaction fees associated with the transactions included in the block they mined. When users send Bitcoin transactions, they have the option to include a transaction fee, which is paid to the miner who successfully mines the block containing their transaction. Transaction fees are typically voluntary, but users may choose to include them to incentivize miners to prioritize their transactions.
@wholeheartedwe2091
@wholeheartedwe2091 5 ай бұрын
Hey Paris, would recommend that you increase the volume of the recording a bit. I'm on full volume and I can hear you, but if I'm not in a silent environment I lose your voice.
@Professorial_Wolf
@Professorial_Wolf 5 ай бұрын
Roger I will buy a professional mic, and redo the pre-assessments after completing each chapter
@Professorial_Wolf
@Professorial_Wolf 5 ай бұрын
I got a Mic for all the videos moving forward now
@ClintDawgMillionaire
@ClintDawgMillionaire 5 ай бұрын
I have never understood this type of attack before your explanation. Thanks Professor!!
@Professorial_Wolf
@Professorial_Wolf 5 ай бұрын
Most definitely!
@ClintDawgMillionaire
@ClintDawgMillionaire 5 ай бұрын
This clarifies so much, thank you!!
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
You're so welcome!
@ClintDawgMillionaire
@ClintDawgMillionaire 5 ай бұрын
Great vid!
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
only the best!
@ClintDawgMillionaire
@ClintDawgMillionaire 5 ай бұрын
Keep these gems coming! The shorter format helps me focus
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
I do my best to get straight to the point
@towely
@towely Ай бұрын
It helps me feel like I'm actually getting somewhere
@ClintDawgMillionaire
@ClintDawgMillionaire 5 ай бұрын
Quick and to the point, thanks Professor!
@Professorial_Wolf
@Professorial_Wolf 3 ай бұрын
AND all encompassing!