Video Citations
- The Caesar cipher | Journey into cryptography | Khan Academy: Watch Video
- Caesar Cipher Tutorial: Watch Video
- Caesar Cipher in Python - A Simple Guide: Watch Video
- Monoalphabetic substitution: Watch Video
- Break a Simple Monoalphabetic Substitution Cipher: Watch Video
- Vigenere Cipher Simple Tutorial: Watch Video
- Vigenere Cipher Simple Guide: Watch Video
- How To Write In Vigenère Cipher: Watch Video
- What is Hashing? Hash Functions Explained Simply: Watch Video
- Hash Function in Cryptography | Properties of Hash Function | Simple Hash Function Tutorial: Watch Video
- Lecture 1: Introduction of Hashing | Hash Function: Watch Video
- Practical Applications of Hashing: Watch Video
- Password Security and Hashing: Watch Video
- Hashing in Blockchain Technology: Watch Video
- Applications of Hashing: Watch Video
- Hashing Algorithm Tutorial: Watch Video
- Hashing in Network Security: Watch Video
- What is Malware? The Most Common Types, How They Work, & How to Easily Avoid Them All: Watch Video
- What is Malware? Types and Dangers of Malware: Watch Video
- Understanding Malware: Types, Risks, and Prevention: Watch Video
- Signature Based Detection: Watch Video
- Behavioral Based Detection: Watch Video
- False Positives and False Negatives: Watch Video
- 5 Tips to Protect Your Privacy Online: Watch Video
- The Beginner's Guide to Digital Privacy: Watch Video
- Personal & Private Information: Watch Video
- Protecting Personal Privacy: Watch Video
- Student Privacy 101: Privacy Risks: Watch Video
- Pause, Think and Act Cybersecurity Awareness Video - Security Quotient: Watch Video
- A Guide to Protecting Personal Privacy Online: Watch Video
- Creating Strong Passwords: Your Key to Online Security: Watch Video
- Explaining Two-Factor Authentication: Watch Video
Content Citations
- CPSC 329 Course Lectures
- CPSC 329 Course Tutorials
- Hashing Cybersecurity Glossary: View Here
- WHAT IS CRYPTOGRAPHY IN CYBER SECURITY: View Here
- Privacy vs. Security: Exploring the Differences & Relationship: View Here
- Protection Against Threats | Cyber Security: View Here
- What is data privacy? View Here
- What Is Malware? - Definition and Examples - Cisco: View Here
- Applications of Hashing - GeeksforGeeks: View Here
- Vigenère Cipher: View Here
- Caesar Cipher in Cryptography: View Here
- Difference between Monoalphabetic Cipher and Polyalphabetic Cipher: View Here