Test 1 Information
[Back] This outlines the details of the first test, and is based on units 1 to 4:
- Understands the operation of a shifted-alphabet/code shifting encryption. Caeser
- Understands the range of asymmetric encryption algorithms.
- Understands the operation of Vigenere encryption algorithms. Vigenere
- Understands how many encryption keys map to the number of bits in the key.Keys
- Calculates the time to crack a code using brute force, and given specifications. Computing Power
- Calculates the time to crack a code using brute force, with increasing computing power.
- Understands the difference between stream and block encryption.
- Understands the decryption process in public-key encryption.
- Understands the usage of private keys in authentication.
- Understands how the recipient authenticates the sender.
- Understands the main parameters of a digital certificate.
- Understands the applications which are signed by certificates.
- Understands the operation of the MD5 signature. MD5
- Understands the hash conversion to Base-64. Base-64
- Understands key entropy.Entropy
- Calculates the exchange parameters for the Diffie-Hellman method. Diffie
- Understands the operation of Diffie-Hellman.
- Understands the concept of port scanning.
- Understands the concept of host scanning.
- Understands Snort rules for destination ports.
- Understands Snort rules for source ports.
- Understands the direction of TCP ports.
- Understands how an agent-based system can detect threats.
- Understands the usage of client TCP ports.
- Understands the significance of the three-way handshake for a client-server connection. Entropy
- Understand the usage of the three-way handshake for detection of events.
- Understand the usage of TCP flags.
- Understands Labs 1-7.