Oh, this just made me realize that figuring out hex is the same as IP addresses in decimal. Adding 128, 64, 36, 16 , 8, 4, 2, 1 if the bit for it is on!
@user-xb9dr5lh8b2 күн бұрын
Is this playlist specifically for Intro to Cryptography @wgu?
@Professorial_Wolf2 күн бұрын
Completely unrelated to cryptography WGU. I have been told it just happens to perfectly align. I would recommend taking notes on everything bold if I was taking a test
@Megan-bl5qm11 күн бұрын
Thank you so much for these videos! They are incredibly helpful
@Professorial_Wolf11 күн бұрын
You're so welcome! Be sure to pass the test now so I can claim to be the number one teacher with the number one student!
@Thebootstrapped11 күн бұрын
Is MD5 the only technique that can have a hash collision?
@Professorial_Wolf11 күн бұрын
Any hash can have a collision. MD5 would be more common the SHA collision because it’s less complex.
@y455020 күн бұрын
The purpose of a digital certificate is to "validate the integrity and authenticity" of a service with respect to an issuer. It's not just to "bind" a public key to a service (whatever "bind" means with your definition). Not sure who made these questions, but some of them are 💩
@Professorial_Wolf19 күн бұрын
I made these! Send some better questions over and I’ll make another question series called bonus practice questions. Or feel free to make a video and I’ll post it on the channel. Digital signature is used to validate the authenticity and integrity. Digital certificate binds
@y455019 күн бұрын
@@Professorial_Wolf "Digital certificate" is another way to say "public key certificate." The standard for CAs and certificates were standardized by the International Telecommunication Union in 1988 with the document "Information Technology - Open Systems Interconnection - The Directory: Authentication Framework." This document defined "user certificate; public key certificate; certificate" (in section 1 part 3.3.3) as "The public keys of a user, together with some other information, *rendered unforgeable by encipherment* with the private key of the certification authority which issued it." The only other defined certificate (aside from the CA's) is the "attribute certificate", defined separately in part 3.3.1. Its definition reads "A set of attributes of a user together with some other information, *rendered unforgeable by the digital signature* created using the private key of the certification authority which issued it." Furthermore, the certificate format represented as the ASN.1 data type *includes* the signature as part of the certificate (viewable in section 3 part 8, in "Obtaining a user’s public key"). If a signature accomplishes the goal of validating authenticity, it follows that any definition of an item including a signature can inherit this property as well. No need for bonus questions or a follow-up video to address what I see as a clearly incorrect answer. Accepting what you have marked as the sole answer ignores the ability of a cert to validate the authenticity of the presenting service with respect to an issuer.
@geeca8521 күн бұрын
I made it to the end! Hey man, just wanted to thank you for all of the videos they were extremely good and my favorite way to learn. I'm feeling optimistic for the test since I turned every 'bold' word you went over into a notecard. I uh, genuinely appreciate the effort you put into these.
@Professorial_Wolf21 күн бұрын
Glad you like them! Let me know how the test goes, and if there are any additional recommendations for videos to make after
@thrillhouse478426 күн бұрын
Hey just thought id mention that the hashing is stored in the etc/shadow file and not the passwd
@Professorial_Wolf26 күн бұрын
Let me double check and I will get back to you. I believe off the top of my head it was originally stored in the passwd and then moved to the etc/shadow file in later years.
@thrillhouse478425 күн бұрын
@@Professorial_Wolf yes and you stayed this correctly in one of your other videos. Just don't want anyone to miss that on a Linux test cause it always comes up as a trick question
@spartansoldier4626 күн бұрын
I just passed the assessment on my first attempt thanks to your series. I appreciate your help professor!
@towelyАй бұрын
This is such an impressively simple concept but it just seems so hard for people to wrap their heads around, myself included. This broke it down just enough to make it stick.
@Professorial_Wolf28 күн бұрын
I do my best
@Megan-bl5qmАй бұрын
Great videos! They are really helping me with this class. I am curious about one thing though: Why do asymmetric keys have to be longer to have the same security as symmetric keys? Is it because they take longer to process?
@Professorial_WolfАй бұрын
it is a one way math formula and it has to use large key because at the same size their are only so many possibilities for prime numbers/ unique numbers versus symmetric that could use any of the numbers in their math equation. With a one way math formula you are forced to use these prime numbers so the message can not be easily cracked
@Megan-bl5qmАй бұрын
@@Professorial_Wolf That makes sense. Thank you!
@andrewstaples9947Ай бұрын
I like that you say being an engineer means looking alot of stuff up...I'm a computer tech for a school district (our title, basically desktop support) and we joke in our team that the secret of our jobs is we are just better at googling than others.
@Professorial_WolfАй бұрын
Yes it is a great learning opportunity walking through the fire.
@andrewstaples9947Ай бұрын
whats with the hard cut on Question 16?
@Professorial_WolfАй бұрын
my second video ever created. bad editing! I should remake it... you want to make it and I will post it up?!? I can send you the slides
@Professorial_WolfАй бұрын
Full Code: # Import Libraries import pandas as pd import numpy as np import tensorflow as tf from sklearn.model_selection import train_test_split # Load the dataset dataset = pd.read_csv('cancer.csv') x = dataset.drop(columns=["diagnosis(1=m, 0=b)"]) y = dataset["diagnosis(1=m, 0=b)"] # Split the dataset into training and test sets x_train, x_test, y_train, y_test = train_test_split(x, y, test_size=0.2) # Build and train the model model = tf.keras.models.Sequential() model.add(tf.keras.layers.Dense(256, input_shape=x_train.shape[1:], activation='sigmoid')) model.add(tf.keras.layers.Dense(256, activation='sigmoid')) model.add(tf.keras.layers.Dense(1, activation='sigmoid')) model.compile(optimizer='adam', loss='binary_crossentropy', metrics=['accuracy']) model.fit(x_train, y_train, epochs=1000) # Evaluate the model on the test set loss, accuracy = model.evaluate(x_test, y_test) print(f"Accuracy on the test set: {accuracy}") # Prepare and predict the new tumor data new_tumor_data = np.array([[13.54, 14.36, 87.46, 566.3, 0.09779, 0.08129, 0.06664, 0.04781, 0.1885, 0.05766, 0.2699, 0.7886, 2.058, 23.56, 0.008462, 0.0146, 0.02387, 0.01315, 0.0198, 0.0023, 15.11, 19.26, 99.7, 711.2, 0.144, 0.1773, 0.239, 0.1288, 0.2977, 0.07259]]) prediction = model.predict(new_tumor_data) print(f"Prediction for the new tumor data: {prediction}") # Determine the diagnosis based on the prediction threshold = 0.5 accuracy_rating = accuracy diagnosis = "malignant" if prediction >= threshold else "benign" print(f"The predicted diagnosis is: {diagnosis}. Accuracy: {accuracy_rating}")
@Rob-uj8bo2 ай бұрын
I've learned more in these 4 videos than I did listening to the whole D334 book summary
@Professorial_Wolf2 ай бұрын
Thank you Rob
@Rob-uj8bo2 ай бұрын
@@Professorial_Wolf Just took my D334 Cryptography test after watching your series twice and passed by a good margin. I took the pre assessment when I started and was no where near the cutoff. 4 days and done thanks again Wolf!
@Professorial_WolfАй бұрын
@@Rob-uj8bo absolutely.highest amount of passes in the I.T. Courses over all instructors
@rkb399127 күн бұрын
@@Rob-uj8boall you did was watch his videos?
@olafharoldsonnii47132 ай бұрын
Thanks Professor wolf!
@Professorial_Wolf2 ай бұрын
Thank you for your support my liege
@jefferyjohnson13232 ай бұрын
Thank you for sharing your knowledge
@Professorial_Wolf2 ай бұрын
So nice of you. Consider making an i.t. Video and I will post it up!
@jefferyjohnson13232 ай бұрын
Thank you 🙏
@Professorial_Wolf2 ай бұрын
Any time!
@jefferyjohnson13232 ай бұрын
Thank you 🙏
@Professorial_Wolf2 ай бұрын
Absolutely
@hareboy123452 ай бұрын
I liked how you explained the Get-FileHash. Thanks for that! It's one thing to learn the theory and it's another to see it in action.
@Professorial_Wolf2 ай бұрын
glad you liked it! Feel free to make a video and I’ll post it up on the channel
@JuiceCS22 ай бұрын
Forgot to tell us to SMASH that like button, subscribe and comment if we have any questions. That is my only complaint.
@Professorial_Wolf2 ай бұрын
Good thing I have your comment here to let everyone know!
@christiansmith87212 ай бұрын
yo professor Wolf, love this, thank you.
@Professorial_Wolf2 ай бұрын
Thank you for your support Christian. Feel free to make a I.t. Video and I will post it!
@clipper1683 ай бұрын
Is the key to the pig pen Biometric
@Professorial_Wolf3 ай бұрын
No it is from the 18th century
@chrisallison121Ай бұрын
@@Professorial_Wolf They're asking if the example given, the one above you talking, spells out biometric, which it does. Yes clipper you're correct
@Professorial_WolfАй бұрын
@@chrisallison121 You are so smart! I misunderstood
@user-ce8hq4qg8p3 ай бұрын
Thanks Professor Wolf
@Professorial_Wolf3 ай бұрын
You're welcome! keep up the studies and you will be the greatest
@user-ce8hq4qg8p3 ай бұрын
Thanks Professor Wolf
@Professorial_Wolf3 ай бұрын
You're welcome! keep learning so you can teach me one day!
@user-ce8hq4qg8p3 ай бұрын
Thanks Professor Wolf
@Professorial_Wolf3 ай бұрын
Any time
@user-ce8hq4qg8p3 ай бұрын
Thanks Professor Wolf
@Professorial_Wolf3 ай бұрын
You're welcome! If you have any more questions or need further assistance, feel free to ask. I'm here to help!
@matthewford54774 ай бұрын
I wouldn't mind a short video on the pig pen demonstrated. Thank you for your videos!
@Professorial_Wolf3 ай бұрын
I am very behind on projects, but can put this in the list... OR you can make it!? and I will post it up on the channel so everyone can send their valentines day sweetheart a encrypted message using Pig Pen!
@clipper1683 ай бұрын
Hi this video told me to comment so ya but it was a good video 🎉
@Professorial_Wolf3 ай бұрын
@@clipper168 you should make a video and ill post it on the channel, and then they can go to your channel
@KevinHolland-ii2xb4 ай бұрын
Why wouldn't "TwoFish" be a correct answer to Question 42? 128 bit block, 128/192/256 key
@Professorial_Wolf3 ай бұрын
TwoFish has a scaling key size that can range from 1 to 256 bits. Commonly used key sizes for twofish is 128/192/256. AES only has the options of 128/192/256.
@AlFromPalletTown4 ай бұрын
Professor Wolf, This video series was very useful. I watched all the cohort videos before this series and I barely failed the PA. (40/60). I sat down and watched this whole playlist, made flashcards and notes of all the bold text. I did better on the PA the second time around and I passed the exam on the first try (all in the same day). I am not saying the cohort videos didn't help, but I wish I had watched your series first. I liked your style of instruction, and I felt like I learned more. I hope to have you as a future professor in my upcoming classes. For students starting intro to cryptography, best of luck! I definitely suggest watching all these videos in the playlist, and reviewing the material in the course chatter!
@Professorial_Wolf3 ай бұрын
Hi thank you for the wonderful compliment @AlFromPalletTown be sure to add me on linkedin. I hope to assist everyone with positions/jobs in the future wherever that may be.
@andrewstaples9947Ай бұрын
I'm about to take my second attempt at the exam after only using the Cohort videos (I barely failed it, got a 65%) and have been cramming the Professor Wolf Videos because it seems more focused than the Quizzets!
@Professorial_WolfАй бұрын
@@andrewstaples9947 this is the way! (In a Mandalorian voice)
@f_if_i_know50494 ай бұрын
Thanks Professor Wolf!
@Professorial_Wolf3 ай бұрын
My pleasure!
@f_if_i_know50494 ай бұрын
Thanks Professor Wolf!
@Professorial_Wolf3 ай бұрын
thank you for being a wonderful student and learning all the information!
@f_if_i_know50494 ай бұрын
Thanks Professor Wolf!
@Professorial_Wolf3 ай бұрын
You are the real hero! keep up the good work!
@f_if_i_know50494 ай бұрын
Thanks Professor Wolf!
@Professorial_Wolf3 ай бұрын
Been very busy working on many projects! just noticed your thanks! thank you for your support
@f_if_i_know50494 ай бұрын
Thanks Professor Wolf
@Professorial_Wolf3 ай бұрын
It was a honor to work with you!
@f_if_i_know50494 ай бұрын
Thanks Professor Wolf?
@Professorial_Wolf3 ай бұрын
Thats me! be sure to add me on linkedin
@JaredFL4 ай бұрын
RC DN
@Professorial_Wolf3 ай бұрын
whats that!? RC DN?
@calebanderson24284 ай бұрын
This is great. Love the series, broken down in an easy to consume format. Thanks!
@Professorial_Wolf3 ай бұрын
Glad you enjoyed it!
@johnwilkins38964 ай бұрын
This has helped out a lot the text and others confused me
@Professorial_Wolf4 ай бұрын
Let me know if you have any questions on any other areas. I will be posting some recruiter’s eventually so everyone can get interviews and potentially their first job
@mikeowens59084 ай бұрын
please explain pre image attack in a different if possible
@Professorial_Wolf4 ай бұрын
Please set up an appointment with me and we can go over the topic. I will make an additional video to explain in a different way. Just very busy working on a 60m+ project for my company
@thebaldcaillou50004 ай бұрын
Hey Professor! Is there a place to download the slides, I am a WGU student. Thank you for the videos!
@Professorial_Wolf4 ай бұрын
Please send me a email and I can email any particular one to you. The cryptography PowerPoint has all the information, condensed
@ClintDawgMillionaire5 ай бұрын
So glad you are starting a Sec+ series. Thanks Prof Wolf!!
@johnny59415 ай бұрын
Can it be hiring managers and ceo's in general? Not just tech related companies?
@Professorial_Wolf5 ай бұрын
Yes, this works in any industry. If they deny you and then you build up skills sometimes they still won’t have a spot for you. Ask for a referral then and keep them updated (treat them as a mentor)
@johnny59415 ай бұрын
@@Professorial_Wolf what I meant was that technical roles exists in companies that do not sell technical services. Is it ideal to contact an administrator to become a programmer, or I would have a significantly stronger chance of getting a job if I contacted someone who actually does technical things.
@Professorial_Wolf5 ай бұрын
@@johnny5941 The Non-management is less likely to assist you. Focus on management/ higher leadership within the department and the recruiters. If you reach out to a person working a admin or programing role say " I am interested in learning more about the roles within your department can you point me in the direction of the manager?" send me a request on linkedin and we can set up a call and I can give you some coaching on your personal situation. www.linkedin.com/in/paris-wolf/ the cost is be sure to subscribe!
@ClintDawgMillionaire5 ай бұрын
Outstanding info, thank you so much.
@Professorial_Wolf5 ай бұрын
Glad it was helpful! Stay tuned as I will be posting many more techniques and setting up qualified candidates with top tier recruiters
@user-ce6jc8fl5n5 ай бұрын
So how exactly does it work when an exchange of a fraction of a bitcoin takes place?
@Professorial_Wolf5 ай бұрын
In addition to the block reward, miners also receive transaction fees associated with the transactions included in the block they mined. When users send Bitcoin transactions, they have the option to include a transaction fee, which is paid to the miner who successfully mines the block containing their transaction. Transaction fees are typically voluntary, but users may choose to include them to incentivize miners to prioritize their transactions.
@wholeheartedwe20915 ай бұрын
Hey Paris, would recommend that you increase the volume of the recording a bit. I'm on full volume and I can hear you, but if I'm not in a silent environment I lose your voice.
@Professorial_Wolf5 ай бұрын
Roger I will buy a professional mic, and redo the pre-assessments after completing each chapter
@Professorial_Wolf5 ай бұрын
I got a Mic for all the videos moving forward now
@ClintDawgMillionaire5 ай бұрын
I have never understood this type of attack before your explanation. Thanks Professor!!
@Professorial_Wolf5 ай бұрын
Most definitely!
@ClintDawgMillionaire5 ай бұрын
This clarifies so much, thank you!!
@Professorial_Wolf3 ай бұрын
You're so welcome!
@ClintDawgMillionaire5 ай бұрын
Great vid!
@Professorial_Wolf3 ай бұрын
only the best!
@ClintDawgMillionaire5 ай бұрын
Keep these gems coming! The shorter format helps me focus
@Professorial_Wolf3 ай бұрын
I do my best to get straight to the point
@towelyАй бұрын
It helps me feel like I'm actually getting somewhere