Network validation & authentication

Password based authentication

  1. Introduction to password authentication
  2. Password Hashing
  3. Password Vulnerabilities
  4. Limitations of passwords
  5. Strong passwords
  6. Two-Factor Authentication (2FA)

Digital Certificates

  1. Introduction to digital certificates
  2. Public & Private Keys
  3. Key Exchange
  4. Certificate Authorities.
  5. Diffie-Hellman

Whitelisting & Blacklisting

  1. Whitelisting
  2. Blacklisting

Topic Tests