Video Description

This lesson covers hashing; specifically:

  • Hash functions
  • Passwords, credit cards, PII
  • Digital forensics
  • Malware analysis and virus protection
  • Hash collisions
  • MAC
  • HMAC

It is important to remember a hash is just about integrity of a system, it does not produce authenticity and is only good for discovering accidental changes in a system.

Course Modules