Professor Wolf
Professor Wolf
  • 71
  • 160 182
IPSEC Phases
IPSEC Phases
Переглядів: 247

Відео

Cryptography, Cryptanalysis, Cryptology, Cleartext, Ciphertext
Переглядів 36814 днів тому
Cryptography, Cryptanalysis, Cryptology, Cleartext, Ciphertext
CIA Triad and PKI
Переглядів 24314 днів тому
CIA Triad and how it relates to PKI/Digital Signatures Confidentiality Integrity Availability
GDPR, HIPPA, PCI DSS, SOX Sarbanes
Переглядів 2021 день тому
GDPR General Data Protection Regulation HIPPA Health Insurance Portability and Accountability Act PCI-DSS Payment Card Industry Data Security Standard SOX The Sarbanes-Oxley Act
MTBF, MTTR, MTTF, RTO, RPO
Переглядів 3321 день тому
MTBF, MTTR, MTTF, RTO, RPO Mean Time Between Failure Mean Time To Recovery Mean Time to Failure Recovery Time Objective Recovery Point Objective
Protocol vs Port
Переглядів 92Місяць тому
SSCP Protocol VS Port
Password Technical Controls
Переглядів 37Місяць тому
Password Complexity, Password Length, Password Aging & Rotation, Password Hashing, Password Lockout, Password MFA
Session Timeout
Переглядів 24Місяць тому
Session Timeout
Least Privilege, Segregation of Duties
Переглядів 53Місяць тому
Paris Wolf teaches SSCP ISC2 Least Privilege, Segregation of Duties
CIA Triad, Accountability, Privacy, Non-Repudiation, Hashing Lab
Переглядів 97Місяць тому
Paris Wolf CIA Triad, Accountability, Privacy, Non-Repudiation, Hashing Lab
ISC2 Code of Ethics
Переглядів 173Місяць тому
Paris Wolf
CryptoGameShow
Переглядів 547Місяць тому
Paris Wolf Represents Cryptography going through a series of questions to earn money.
STAR Interview
Переглядів 51Місяць тому
Situation Task Action Response
Comptia Competition SEC + 1.4
Переглядів 1443 місяці тому
Paris Wolf CompTIA Competition submission. Reviewing objectives 1.4 PKI, Public Key, Private Key, Asymmetric Encryption, RSA, Key Escrow, Key Exchange Diffie-Hellman, Transport Layer Security, Symmetric Encryption, AES, Key Length, Encryption, Full Disk Encryption, Partition, Volume, File Encryption, Database, Record, Bonus Content #CompTIACastingCall #ad #CompTIAContest
AI Learning
Переглядів 774 місяці тому
An introduction to AI focusing on building a Binary AI. Cancer File: github.com/VoidKnight-AI/Binary-AI Google CoLab: colab.research.google.com/ Pandas: pandas.pydata.org/ NumPy: numpy.org/ TensorFlow: www.tensorflow.org/ SKLearn: scikit-learn.org/stable/index.html
Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman
Переглядів 2,3 тис.4 місяці тому
Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman
Encryption Full Disk, Partition, Volume, Record, Database
Переглядів 1014 місяці тому
Encryption Full Disk, Partition, Volume, Record, Database
Change management, technical implementations, Documentation, version control
Переглядів 1056 місяців тому
Change management, technical implementations, Documentation, version control
Physical security, Honeypot
Переглядів 816 місяців тому
Physical security, Honeypot
GAP Analysis, Zero Trust, Control Plane, Data Plane
Переглядів 2807 місяців тому
GAP Analysis, Zero Trust, Control Plane, Data Plane
Security Controls
Переглядів 1517 місяців тому
Security Controls
how to get your application pulled without knowing anyone
Переглядів 4157 місяців тому
how to get your application pulled without knowing anyone
Cert types ,Digital Certificate stages, states of revocation
Переглядів 2,5 тис.7 місяців тому
Cert types ,Digital Certificate stages, states of revocation
Cryptocracking
Переглядів 2,2 тис.7 місяців тому
Cryptocracking
key escrow, anobus, AES weakness
Переглядів 2,3 тис.7 місяців тому
key escrow, anobus, AES weakness
One, Two Way Authentication, EndtoEnd and Intermediate Authentication, Types of Authentication
Переглядів 2,4 тис.7 місяців тому
One, Two Way Authentication, EndtoEnd and Intermediate Authentication, Types of Authentication
IKE, TOR
Переглядів 2,3 тис.7 місяців тому
IKE, TOR
CBC-MAC CCM, Windows hashing, Linux hashing
Переглядів 2,5 тис.7 місяців тому
CBC-MAC CCM, Windows hashing, Linux hashing
ChaCha20, A5 cipher
Переглядів 2,1 тис.7 місяців тому
ChaCha20, A5 cipher
Frequency analysis
Переглядів 3,2 тис.7 місяців тому
Frequency analysis

КОМЕНТАРІ

  • @thewrongshoes
    @thewrongshoes 5 днів тому

    I'm confused on what the difference is between cipher feedback and output feedback. I missing something ...

    • @Professorial_Wolf
      @Professorial_Wolf 5 днів тому

      One takes from the cipher stage and the other from the XOR stage. This output is used for the IV of the next block

  • @elijahburns5716
    @elijahburns5716 6 днів тому

    These videos are so helpful! Thank you!

    • @elijahburns5716
      @elijahburns5716 6 днів тому

      also I may be wrong but I think the first time you mention digital certificates, i believe the title it say digital signatures, I may be wrong though.

    • @Professorial_Wolf
      @Professorial_Wolf 5 днів тому

      Glad you like them! Feel free to make any additional requests or make a video and I will put it up

  • @thewrongshoes
    @thewrongshoes 12 днів тому

    Can I get a copy of the slides for my studies ?

  • @alexandraswan6591
    @alexandraswan6591 13 днів тому

    Hi! Have you heard of the death of Ray Rivera? The family believe he was a Freemason, which uses cryptic messages. He was found dead with a weird letter tapped to the back of his computer screen. Would you be able to understand it? He mentioned random movie titles and such. It is on episode 1 of Unsolved Mysteries on Netflix.

    • @alexandraswan6591
      @alexandraswan6591 13 днів тому

      I forgot to add, the Freemasons are known to use the Masonic cipher.

    • @Professorial_Wolf
      @Professorial_Wolf 13 днів тому

      I have not! I don’t own a t.v. at the moment. I will have to take a look at the letter break the encryption, solve the case, and hopefully it will review some secrets

  • @SeanKrein
    @SeanKrein 14 днів тому

    This series was extremely helpful thank you Professor Wolf!

    • @Professorial_Wolf
      @Professorial_Wolf 13 днів тому

      You're very welcome! Be sure to set an appointment if you have any questions!

  • @dustinlenskold7000
    @dustinlenskold7000 17 днів тому

    Thank You

    • @Professorial_Wolf
      @Professorial_Wolf 17 днів тому

      You're welcome! Feel free to suggest/ make a video

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 18 днів тому

    Very helpful, clarifying terms that get thrown around a lot!

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 18 днів тому

    Nicely done! Now I get the CIA triad, thank you!

    • @Professorial_Wolf
      @Professorial_Wolf 17 днів тому

      Thanks! just for everyone's reference CIA triad stands for Confidentiality, Integrity, Availability... not the secret agency

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 19 днів тому

    Short and to the point. God job!

    • @Professorial_Wolf
      @Professorial_Wolf 17 днів тому

      Im looking forward to when we can just upload information directly into the brain fy 3077

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 20 днів тому

    Great video, I didn’t know any of this!

    • @Professorial_Wolf
      @Professorial_Wolf 16 днів тому

      We must continue to spread the word of these Laws so all know

  • @ClintDawgMillionaire
    @ClintDawgMillionaire 21 день тому

    Finally, these terms make sense. Thanks Prof. Wolf!

  • @reed17purdue
    @reed17purdue 25 днів тому

    Hipaa not hippa

  • @Propain4eva
    @Propain4eva 29 днів тому

    Wow! I appreciate all these in-depth answers and thorough videos. Hope you make it big on UA-cam!

    • @Professorial_Wolf
      @Professorial_Wolf 27 днів тому

      I appreciate that! Hopefully can upgrade the equipment in the near future for higher quality videos

  • @ethanheath9453
    @ethanheath9453 Місяць тому

    Do you have that review document that he kept referring to?

  • @ClintDawgMillionaire
    @ClintDawgMillionaire Місяць тому

    Another outstanding video, thanks Professor Wolf!

    • @Professorial_Wolf
      @Professorial_Wolf 27 днів тому

      Thank you Clint Dawg. With a last name like Dawg I wonder if we are distantly related

  • @ClintDawgMillionaire
    @ClintDawgMillionaire Місяць тому

    Man your vids pack so much knowledge in such a short time! Keep em coming

    • @Professorial_Wolf
      @Professorial_Wolf Місяць тому

      Glad you like them! I have 1000 more im working on

  • @jheon312
    @jheon312 Місяць тому

    Watched all of your videos and skimmed the book in regards to intro to cryptography and was able to pass the assessment! Thank you for this.

  • @ClintDawgMillionaire
    @ClintDawgMillionaire Місяць тому

    Its impressive how much knowledge you have fit into one minute

    • @Professorial_Wolf
      @Professorial_Wolf Місяць тому

      Just wait until we can neural uplink a terabyte of data a second! Fy3024!

  • @cdlroho75
    @cdlroho75 2 місяці тому

    Professor wolf, the only man giving Steve Harvey a run for his money in the suit game!

    • @Professorial_Wolf
      @Professorial_Wolf 2 місяці тому

      Awh yes my nemesis Steve Harvey. In the end only one can be left standing in a suit. #voldermort #harrypotter

  • @cdlroho75
    @cdlroho75 2 місяці тому

    And to think I told my Highschool teacher I would never need to know math...... Thanks Professor Wolf!

    • @Professorial_Wolf
      @Professorial_Wolf 2 місяці тому

      I bet they told you those essays were important too…Now we have chat gpt!

  • @miradwyn
    @miradwyn 2 місяці тому

    Oh, this just made me realize that figuring out hex is the same as IP addresses in decimal. Adding 128, 64, 36, 16 , 8, 4, 2, 1 if the bit for it is on!

  • @goblion-e8n
    @goblion-e8n 2 місяці тому

    Is this playlist specifically for Intro to Cryptography @wgu?

    • @Professorial_Wolf
      @Professorial_Wolf 2 місяці тому

      Completely unrelated to cryptography WGU. I have been told it just happens to perfectly align. I would recommend taking notes on everything bold if I was taking a test

  • @Megan-bl5qm
    @Megan-bl5qm 2 місяці тому

    Thank you so much for these videos! They are incredibly helpful

    • @Professorial_Wolf
      @Professorial_Wolf 2 місяці тому

      You're so welcome! Be sure to pass the test now so I can claim to be the number one teacher with the number one student!

  • @Thebootstrapped
    @Thebootstrapped 3 місяці тому

    Is MD5 the only technique that can have a hash collision?

    • @Professorial_Wolf
      @Professorial_Wolf 2 місяці тому

      Any hash can have a collision. MD5 would be more common the SHA collision because it’s less complex.

  • @y4550
    @y4550 3 місяці тому

    The purpose of a digital certificate is to "validate the integrity and authenticity" of a service with respect to an issuer. It's not just to "bind" a public key to a service (whatever "bind" means with your definition). Not sure who made these questions, but some of them are 💩

    • @Professorial_Wolf
      @Professorial_Wolf 3 місяці тому

      I made these! Send some better questions over and I’ll make another question series called bonus practice questions. Or feel free to make a video and I’ll post it on the channel. Digital signature is used to validate the authenticity and integrity. Digital certificate binds

    • @y4550
      @y4550 3 місяці тому

      ​@@Professorial_Wolf "Digital certificate" is another way to say "public key certificate." The standard for CAs and certificates were standardized by the International Telecommunication Union in 1988 with the document "Information Technology - Open Systems Interconnection - The Directory: Authentication Framework." This document defined "user certificate; public key certificate; certificate" (in section 1 part 3.3.3) as "The public keys of a user, together with some other information, *rendered unforgeable by encipherment* with the private key of the certification authority which issued it." The only other defined certificate (aside from the CA's) is the "attribute certificate", defined separately in part 3.3.1. Its definition reads "A set of attributes of a user together with some other information, *rendered unforgeable by the digital signature* created using the private key of the certification authority which issued it." Furthermore, the certificate format represented as the ASN.1 data type *includes* the signature as part of the certificate (viewable in section 3 part 8, in "Obtaining a user’s public key"). If a signature accomplishes the goal of validating authenticity, it follows that any definition of an item including a signature can inherit this property as well. No need for bonus questions or a follow-up video to address what I see as a clearly incorrect answer. Accepting what you have marked as the sole answer ignores the ability of a cert to validate the authenticity of the presenting service with respect to an issuer.

    • @MrOthellonc
      @MrOthellonc Місяць тому

      the explanation in the video he gave makes sense. He told us the integrity and auth happens with the digital signature that is within the digital certificate...

    • @y4550
      @y4550 Місяць тому

      @@MrOthellonc 9:34 is a very clear "no". Also my longer comment about the original specification introducing certs was seemingly deleted which indicates bad faith. I take teaching seriously and hold those who choose to do so accountable for doing the proper research needed before disseminating information to aspiring students

  • @geeca85
    @geeca85 3 місяці тому

    I made it to the end! Hey man, just wanted to thank you for all of the videos they were extremely good and my favorite way to learn. I'm feeling optimistic for the test since I turned every 'bold' word you went over into a notecard. I uh, genuinely appreciate the effort you put into these.

    • @Professorial_Wolf
      @Professorial_Wolf 3 місяці тому

      Glad you like them! Let me know how the test goes, and if there are any additional recommendations for videos to make after

  • @thrillhouse4784
    @thrillhouse4784 3 місяці тому

    Hey just thought id mention that the hashing is stored in the etc/shadow file and not the passwd

    • @Professorial_Wolf
      @Professorial_Wolf 3 місяці тому

      Let me double check and I will get back to you. I believe off the top of my head it was originally stored in the passwd and then moved to the etc/shadow file in later years.

    • @thrillhouse4784
      @thrillhouse4784 3 місяці тому

      @@Professorial_Wolf yes and you stayed this correctly in one of your other videos. Just don't want anyone to miss that on a Linux test cause it always comes up as a trick question

  • @spartansoldier46
    @spartansoldier46 3 місяці тому

    I just passed the assessment on my first attempt thanks to your series. I appreciate your help professor!

  • @towely
    @towely 3 місяці тому

    This is such an impressively simple concept but it just seems so hard for people to wrap their heads around, myself included. This broke it down just enough to make it stick.

  • @Megan-bl5qm
    @Megan-bl5qm 3 місяці тому

    Great videos! They are really helping me with this class. I am curious about one thing though: Why do asymmetric keys have to be longer to have the same security as symmetric keys? Is it because they take longer to process?

    • @Professorial_Wolf
      @Professorial_Wolf 3 місяці тому

      it is a one way math formula and it has to use large key because at the same size their are only so many possibilities for prime numbers/ unique numbers versus symmetric that could use any of the numbers in their math equation. With a one way math formula you are forced to use these prime numbers so the message can not be easily cracked

    • @Megan-bl5qm
      @Megan-bl5qm 3 місяці тому

      @@Professorial_Wolf That makes sense. Thank you!

  • @andrewstaples9947
    @andrewstaples9947 4 місяці тому

    I like that you say being an engineer means looking alot of stuff up...I'm a computer tech for a school district (our title, basically desktop support) and we joke in our team that the secret of our jobs is we are just better at googling than others.

    • @Professorial_Wolf
      @Professorial_Wolf 4 місяці тому

      Yes it is a great learning opportunity walking through the fire.

  • @andrewstaples9947
    @andrewstaples9947 4 місяці тому

    whats with the hard cut on Question 16?

    • @Professorial_Wolf
      @Professorial_Wolf 4 місяці тому

      my second video ever created. bad editing! I should remake it... you want to make it and I will post it up?!? I can send you the slides

  • @Professorial_Wolf
    @Professorial_Wolf 4 місяці тому

    Full Code: # Import Libraries import pandas as pd import numpy as np import tensorflow as tf from sklearn.model_selection import train_test_split # Load the dataset dataset = pd.read_csv('cancer.csv') x = dataset.drop(columns=["diagnosis(1=m, 0=b)"]) y = dataset["diagnosis(1=m, 0=b)"] # Split the dataset into training and test sets x_train, x_test, y_train, y_test = train_test_split(x, y, test_size=0.2) # Build and train the model model = tf.keras.models.Sequential() model.add(tf.keras.layers.Dense(256, input_shape=x_train.shape[1:], activation='sigmoid')) model.add(tf.keras.layers.Dense(256, activation='sigmoid')) model.add(tf.keras.layers.Dense(1, activation='sigmoid')) model.compile(optimizer='adam', loss='binary_crossentropy', metrics=['accuracy']) model.fit(x_train, y_train, epochs=1000) # Evaluate the model on the test set loss, accuracy = model.evaluate(x_test, y_test) print(f"Accuracy on the test set: {accuracy}") # Prepare and predict the new tumor data new_tumor_data = np.array([[13.54, 14.36, 87.46, 566.3, 0.09779, 0.08129, 0.06664, 0.04781, 0.1885, 0.05766, 0.2699, 0.7886, 2.058, 23.56, 0.008462, 0.0146, 0.02387, 0.01315, 0.0198, 0.0023, 15.11, 19.26, 99.7, 711.2, 0.144, 0.1773, 0.239, 0.1288, 0.2977, 0.07259]]) prediction = model.predict(new_tumor_data) print(f"Prediction for the new tumor data: {prediction}") # Determine the diagnosis based on the prediction threshold = 0.5 accuracy_rating = accuracy diagnosis = "malignant" if prediction >= threshold else "benign" print(f"The predicted diagnosis is: {diagnosis}. Accuracy: {accuracy_rating}")

  • @Professorial_Wolf
    @Professorial_Wolf 4 місяці тому

    Oh no everything is on the left hand side of the screen. who would do this!

  • @Rob-uj8bo
    @Rob-uj8bo 4 місяці тому

    I've learned more in these 4 videos than I did listening to the whole D334 book summary

    • @Professorial_Wolf
      @Professorial_Wolf 4 місяці тому

      Thank you Rob

    • @Rob-uj8bo
      @Rob-uj8bo 4 місяці тому

      @@Professorial_Wolf Just took my D334 Cryptography test after watching your series twice and passed by a good margin. I took the pre assessment when I started and was no where near the cutoff. 4 days and done thanks again Wolf!

    • @Professorial_Wolf
      @Professorial_Wolf 4 місяці тому

      @@Rob-uj8bo absolutely.highest amount of passes in the I.T. Courses over all instructors

    • @rkb3991
      @rkb3991 3 місяці тому

      @@Rob-uj8boall you did was watch his videos?

  • @olafharoldsonnii4713
    @olafharoldsonnii4713 4 місяці тому

    Thanks Professor wolf!

  • @jefferyjohnson1323
    @jefferyjohnson1323 4 місяці тому

    Thank you for sharing your knowledge

    • @Professorial_Wolf
      @Professorial_Wolf 4 місяці тому

      So nice of you. Consider making an i.t. Video and I will post it up!

  • @jefferyjohnson1323
    @jefferyjohnson1323 4 місяці тому

    Thank you 🙏

  • @jefferyjohnson1323
    @jefferyjohnson1323 4 місяці тому

    Thank you 🙏

  • @hareboy12345
    @hareboy12345 4 місяці тому

    I liked how you explained the Get-FileHash. Thanks for that! It's one thing to learn the theory and it's another to see it in action.

    • @Professorial_Wolf
      @Professorial_Wolf 4 місяці тому

      glad you liked it! Feel free to make a video and I’ll post it up on the channel

  • @JuiceCS2
    @JuiceCS2 4 місяці тому

    Forgot to tell us to SMASH that like button, subscribe and comment if we have any questions. That is my only complaint.

    • @Professorial_Wolf
      @Professorial_Wolf 4 місяці тому

      Good thing I have your comment here to let everyone know!

  • @christiansmith8721
    @christiansmith8721 5 місяців тому

    yo professor Wolf, love this, thank you.

    • @Professorial_Wolf
      @Professorial_Wolf 5 місяців тому

      Thank you for your support Christian. Feel free to make a I.t. Video and I will post it!

  • @clipper168
    @clipper168 5 місяців тому

    Is the key to the pig pen Biometric

    • @Professorial_Wolf
      @Professorial_Wolf 5 місяців тому

      No it is from the 18th century

    • @chrisallison121
      @chrisallison121 3 місяці тому

      @@Professorial_Wolf They're asking if the example given, the one above you talking, spells out biometric, which it does. Yes clipper you're correct

    • @Professorial_Wolf
      @Professorial_Wolf 3 місяці тому

      @@chrisallison121 You are so smart! I misunderstood

  • @JamesCallender-b5m
    @JamesCallender-b5m 6 місяців тому

    Thanks Professor Wolf

    • @Professorial_Wolf
      @Professorial_Wolf 6 місяців тому

      You're welcome! keep up the studies and you will be the greatest

  • @JamesCallender-b5m
    @JamesCallender-b5m 6 місяців тому

    Thanks Professor Wolf

    • @Professorial_Wolf
      @Professorial_Wolf 6 місяців тому

      You're welcome! keep learning so you can teach me one day!

  • @JamesCallender-b5m
    @JamesCallender-b5m 6 місяців тому

    Thanks Professor Wolf

  • @JamesCallender-b5m
    @JamesCallender-b5m 6 місяців тому

    Thanks Professor Wolf

    • @Professorial_Wolf
      @Professorial_Wolf 6 місяців тому

      You're welcome! If you have any more questions or need further assistance, feel free to ask. I'm here to help!

  • @matthewford5477
    @matthewford5477 6 місяців тому

    I wouldn't mind a short video on the pig pen demonstrated. Thank you for your videos!

    • @Professorial_Wolf
      @Professorial_Wolf 6 місяців тому

      I am very behind on projects, but can put this in the list... OR you can make it!? and I will post it up on the channel so everyone can send their valentines day sweetheart a encrypted message using Pig Pen!

    • @clipper168
      @clipper168 5 місяців тому

      Hi this video told me to comment so ya but it was a good video 🎉

    • @Professorial_Wolf
      @Professorial_Wolf 5 місяців тому

      @@clipper168 you should make a video and ill post it on the channel, and then they can go to your channel

  • @KevinHolland-ii2xb
    @KevinHolland-ii2xb 6 місяців тому

    Why wouldn't "TwoFish" be a correct answer to Question 42? 128 bit block, 128/192/256 key

    • @Professorial_Wolf
      @Professorial_Wolf 6 місяців тому

      TwoFish has a scaling key size that can range from 1 to 256 bits. Commonly used key sizes for twofish is 128/192/256. AES only has the options of 128/192/256.

  • @AlFromPalletTown
    @AlFromPalletTown 6 місяців тому

    Professor Wolf, This video series was very useful. I watched all the cohort videos before this series and I barely failed the PA. (40/60). I sat down and watched this whole playlist, made flashcards and notes of all the bold text. I did better on the PA the second time around and I passed the exam on the first try (all in the same day). I am not saying the cohort videos didn't help, but I wish I had watched your series first. I liked your style of instruction, and I felt like I learned more. I hope to have you as a future professor in my upcoming classes. For students starting intro to cryptography, best of luck! I definitely suggest watching all these videos in the playlist, and reviewing the material in the course chatter!

    • @Professorial_Wolf
      @Professorial_Wolf 6 місяців тому

      Hi thank you for the wonderful compliment @AlFromPalletTown be sure to add me on linkedin. I hope to assist everyone with positions/jobs in the future wherever that may be.

    • @andrewstaples9947
      @andrewstaples9947 4 місяці тому

      I'm about to take my second attempt at the exam after only using the Cohort videos (I barely failed it, got a 65%) and have been cramming the Professor Wolf Videos because it seems more focused than the Quizzets!

    • @Professorial_Wolf
      @Professorial_Wolf 4 місяці тому

      @@andrewstaples9947 this is the way! (In a Mandalorian voice)