Week 1 Securing Data

Passwords. Hashing. Dictionary Attacks. Brute-Force Attacks. Rainbow Tables. Salting. One-Way Hash Functions. Cryptographic Hash Functions. Cryptography. Codes. Ciphers. Encryptiong. Decryption. Keys. Secret-Key Cryptography. Cryptanalysis. Public-Key Cryptography. RSA. Key Exchange. Diffie-Hellman. Digital Signatures. Passkeys. Encryption in Transit. End-to-End Encryption. Deletion. Secure Deletion. Full-Disk Encryption. Encryption at Rest. Ransomware. Quantum Computing.