Video Description

This lesson covers hashing; specifically:

  • Hash functions

  • Passwords, credit cards, PII

  • Digital forensics

  • Malware analysis and virus protection

  • Hash collisions

  • MAC

  • HMAC

It is important to remember a hash is just about integrity of a system, it does not produce authenticity and is only good for discovering accidental changes in a system.

Course Modules