YoVDO

Applied Cryptography and Trust - Tunnelling

Offered By: Bill Buchanan OBE via YouTube

Tags

Network Security Courses Data Protection Courses

Course Description

Overview

Explore the fundamentals of tunnelling in applied cryptography and trust through this comprehensive 37-minute video lecture. Delve into tunnel basics, various tunneling methods, and the intricacies of SSL/TLS protocols. Learn how tunnelling works, including the client hello process, different tunnelling protocols, and the phases involved. Gain valuable insights into secure communication techniques and their practical applications in modern cybersecurity. Access additional illustrations and resources to enhance your understanding of this crucial aspect of network security.

Syllabus

Introduction
Tunnel Basics
Tunneling Methods
SSL TLS
How it works
Client Hello
Tunnelling Protocols
Tunnelling Phases
Summary


Taught by

Bill Buchanan OBE

Related Courses

Cryptography II
Stanford University via Coursera
Microsoft Enterprise Mobility Suite
Microsoft via edX
Social Media - What No One has Told You about Privacy
openHPI
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX