-
Module 1 3
Introduction
-
Lecture1.130 min
-
Lecture1.205 min
-
Lecture1.305 min
-
-
Module 2 18
Fundamental Elements of Cybersecurity
-
Lecture2.105 min
-
Lecture2.205 min
-
Lecture2.305 min
-
Lecture2.405 min
-
Lecture2.505 min
-
Lecture2.605 min
-
Lecture2.705 min
-
Lecture2.805 min
-
Lecture2.905 min
-
Lecture2.1005 min
-
Lecture2.1105 min
-
Lecture2.1205 min
-
Lecture2.1305 min
-
Lecture2.1405 min
-
Lecture2.1505 min
-
Lecture2.1605 min
-
Lecture2.1705 min
-
Lecture2.1805 min
-
-
Module 3 13
Introduction to Cyber Threats
-
Lecture3.105 min
-
Lecture3.205 min
-
Lecture3.305 min
-
Lecture3.405 min
-
Lecture3.505 min
-
Lecture3.605 min
-
Lecture3.705 min
-
Lecture3.805 min
-
Lecture3.905 min
-
Lecture3.1005 min
-
Lecture3.1105 min
-
Lecture3.1205 min
-
Lecture3.1305 min
-
-
Module 4 12
Security Risk Analysis and Management
-
Lecture4.105 min
-
Lecture4.205 min
-
Lecture4.305 min
-
Lecture4.405 min
-
Lecture4.505 min
-
Lecture4.605 min
-
Lecture4.705 min
-
Lecture4.805 min
-
Lecture4.905 min
-
Lecture4.1005 min
-
Lecture4.1105 min
-
Lecture4.1205 min
-
-
Module 5 3
Cybersecurity Laws
-
Lecture5.105 min
-
Lecture5.205 min
-
Lecture5.305 min
-
-
Module 6 1
Conclusion
-
Lecture6.105 min
-
-
Exam 1
-
Quiz7.130 questionsFinal
-
Password Encryption
It is said that about 81% of hacking attempts are successful only due to weak passwords. Weak passwords are those which are quite easy to guess, i.e., passwords comprising of birthdays, definite sequence of numbers, or anything that another person can easily decode. Since passwords validate our access to the cyber world, so it is very important to protect them so as to curb the menace of a cyber-attack. One sheer way to do this is the technique of password encryption, where the user’s password is encrypted using different encryption algorithms. However, as per the USA’s Department of Homeland Security, AES-256-bit encryption is the most reliable encryption algorithm to use. These algorithms mask the subjected data bits in a way where they become useless for hackers. Thus, only the owner of these data bits can use them in a useful way. In this way, password exploitation and theft are depreciated, thereby making those 81% attempts a mere failure. There are plenty of password managers which can do this for anyone deeming to encrypt their passwords.