Initialization Vectors

Join Cybrary

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here
< Back to S3SS10NS

Initialization Vectors

Published: February 24, 2016 | By: Kelly Handerhan | Views: 5516
This post has been saved to your profile

This Weeks S3SS10N Wednesday

You must be a Cybrary member to view this S3SS10N Wednesday Video .. Login or Join for Free Now

Whiteboard Notes

Click Image to View a Larger Version
< Back to S3SS10NS

About This S3SS10N Wednesday's Contributor

Kelly Handerhan
Skilled and certified in CISSP, CASP, and PMP, SME Kelly has taught several courses on Cybrary and is highly praised for her ability to effectively communicate important information in a relate-able and understandable way.
Enjoy this S3SS10N Wednesday? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter LinkedIn Email
Join Cybrary
  1. Thanks Kelly. Now I know that “salting” isn’t using my laptop at the beach. Although this eventually prevents access to the information (through rusting parts) I am glad it is something different. Good information, clearly presented.

  2. I’m starting to wish we had the ability to thumbs up videos. Great Job!

  3. Thank you for another excellent lesson Kelly. You are great at explaining these complex subjects.
    I am going to spend the next couple of hours reviewing Java/PHP examples of simple encryption that use salts and IVs so I can understand better how to implement them now that I know what they are.

    Before when I had went through encryption examples in Java the IV and salt was something I had no idea about. Again, thank you so much your time and teachings. They are much appreciated.

  4. Great session ……..

Page 2 of 3«123»
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?