
· Alex · security
How Many Keys Are Used in Symmetric Cryptography?
Applications, types of ciphers, pros and cons, key management, storage, integration with other cryptographic primitives and vulnerabilities
Applications, types of ciphers, pros and cons, key management, storage, integration with other cryptographic primitives and vulnerabilities
General ways of reporting malicious actors to social media providers, gaming platforms and law enforcement
How to get into ethical hacking, motivation, mindset, essential skills, pathways, legal aspects
A dive into the top web application vulnerabilities, including injection flaws, XSS, authentication and session management issues, XXE, CSRF, insecure deserialization, and more
How AES works and how it applies to application security
The 4 phases of the OWASPs Testing Guide and key testing techniques