mitigater
mitigater
Mitigater
12 posts
Don't wanna be here? Send us removal request.
mitigater · 4 years ago
Photo
Tumblr media
Looking to upskill your knowledge and climb up the Cyber Security ladder? Confused by the industry certifications landscape and trying to decide which one is right for you? Check out our handy guide to Cyber Security Professional Certification Courses in www.mitigater.in #mitigater #cybersecurity #cybersecuritytraining #CyberSecurityCourses #carrier #carrierincybersecurity #carrierguide #CCNA #certification #cisa (at Bhubaneswar, India) https://www.instagram.com/p/COWLZtUrwop/?igshid=1mq08lv3nn03w
1 note · View note
mitigater · 4 years ago
Photo
Tumblr media
Let us honor all the workers, who have worked hard in bringing comforts to our lives. Without workers, no nation can walk the path of success and progress. Warm wishes to all on the occasion of International Workers’ Day. #mitigater #laborday #WorkersDay #mayday #May1st #internationalworkersday #bhubaneswar (at Bhubaneswar, India) https://www.instagram.com/p/COUm32gLxjV/?igshid=3gl7f8703juk
0 notes
mitigater · 5 years ago
Text
Tumblr media
1 note · View note
mitigater · 5 years ago
Photo
Tumblr media
#learnfromhome #onlinelearning #staysafestayhome (at patia.bbsr) https://www.instagram.com/p/CAjgALghgk0/?igshid=368v9kzg7fe3
0 notes
mitigater · 5 years ago
Photo
Tumblr media
#cybersecurity #ethicalhacking #networking #certification (at patia.bbsr) https://www.instagram.com/p/CAU-xUQhBMd/?igshid=xjjwrgsyxle9
1 note · View note
mitigater · 5 years ago
Photo
Tumblr media
#cybersecurity #redhat #linux #ethicalhacking #networking #ccna (at patia.bbsr) https://www.instagram.com/p/B_725UahCbF/?igshid=10d1g495r1303
0 notes
mitigater · 5 years ago
Text
0 notes
mitigater · 5 years ago
Video
instagram
Want to known more, please visit www.mitigater.in #ccnacertification #ccnp #ccie #workfromhome #learnfromhome #onlinelearning #cryptography #securityanalyst #cloudcomputing #networking #webapplication #mobileapplication #cyberintelligence #socialengineeringservices #socialengineering #awsadministration #azureadministration #microsoftazure#redhat #cybersecurity #ethicalhacking #python #artificialintelligence #machinelearning #internetninja #asafirewall https://www.instagram.com/p/B_Oc6mWDlbg/?igshid=1njqywago1h4o
0 notes
mitigater · 5 years ago
Photo
Tumblr media
Do you really know that cyber security and ethical hacker both are not same ? Now a days every one is running towards hacking. But would you know that there are many things that a ethical hacker can't do whereas a cyber security Expert can do all the things with your permission also. And the career in Cyber security is best and gives wide platform to a person comparable to hacking..... If you want to know more about this then visit..... https://mitigater.in/one-page/blog/blog/post.php?id=16 And do visit our site... www.mitigater.in #cybersecurity #ethicalhacking #ccna #networking #python #artificialintelligence #machinelearning #elearning #learnfromhome #onlinelearning #cryptography #securityanalyst #ccie #ccnp #redhat #linuxadministration #azureadministration #cyberintelligence #socialengineeringservices #webapplication #mobileapplication #dataanalytics #certificationcourse #asafirewall #microsoftazure #encryption #decryption #hacker (at Bhubaneswar,Odisha,India) https://www.instagram.com/p/B_CNm2fhjQi/?igshid=h2hdg9c7p5x4
1 note · View note
mitigater · 5 years ago
Text
Tumblr media
Mitigater provides all courses in one module like CCNA (network) cyber security ,linux ADMINISTRATION, cloud computing in one bundle...
Which will you to learn all about cybersecurity and also seeking jobs..
To know more visit our site and Please visit our blogs
http://www.mitigater.in
0 notes
mitigater · 5 years ago
Link
By definition, cryptography is the process of converting recognizable data into an encrypted code for transmitting it over a network (either trusted or untrusted). Data is encrypted at the source, i.e. sender's end and decrypted at the destination, i.e. receiver's end.In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted into usable plaintext using different encryption algorithms.The Purpose:-*
Authentication: The process of proving one's identity.* Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.* I
ntegrity: Assuring the receiver that the received message has not been altered in any way from the original.* Non-repudiation: A mechanism to prove that the sender I really sent this message.In general cryptographic algorithms are classified into three categories as follows :
1) Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption. 2) Public Key Cryptography (PKC): Uses one key for encryption and another for decryption. 3) Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information. Secret Key Cryptography:- With secret key cryptography, a single key is used for both encryption and decryption. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption. Secret key cryptography algorithms that are in use today include :
1) Data Encryption Standard (DES): DES is a block-cipher employing a 56-bit key that operates on 64-bit blocks. DES uses a key of only 56 bits, and thus it is now susceptible to "brute force" attacks.
Triple-DES (3DES) and DESX are the two important variants that strengthen DES. Triple-DES (3DES)   UTF-8 is a compromise character encoding that can be as compact as ASCII (if the file is just plain English text) but can also contain any Unicode characters (with some increase in file size). UTF stands for Unicode Transformation Format. The '8' means it uses 8-bit blocks to represent a character. 2) Advanced Encryption Standard (AES ): The algorithm can use a variable block length and key length; the latest specification allowed any combination of keys lengths of 128, 192, or 256 bits and blocks of length 128, 192, or 256 bits. 3 ) International Data Encryption Algorithm (IDEA) : Secret-key cryptosystem written by Xuejia Lai and James Massey, in 1992 and patented by Ascom; a 64-bit SKC block cipher using a 128-bit key. Also available internationally. 4) Rivest Ciphers: Named for Ron Rivest, a series of SKC (symmetric key cryptography) algorithms. RC1: Designed on paper but never implemented. RC2: A 64-bit block cipher using variable-sized keys designed to replace DES. It's code has not been made public although many companies have licensed RC2 for use in their products. Described in RFC 2268. RC3: Found to be breakable during development. RC4: A stream cipher using variable-sized keys; it is widely used in commercial cryptography products, although it can only be exported using keys that are 40 bits or less in length. RC5: A block-cipher supporting a variety of block sizes, key sizes, and the number of encryption passes over the data. Described in RFC 2040. RC6: An improvement over RC5, RC6 was one of the AES advanced encryption standard Round 2 algorithms. 5) Blowfish: A symmetric 64-bit block cipher invented by Bruce Schneier; optimized for 32-bit processors with large data caches, it is significantly faster than DES on a Pentium/PowerPC-class machine. Key lengths can vary from 32 to 448 bits in length. Blowfish, available freely and intended as a substitute for DES or IDEA, is in use in over 80 products.Public-Key Cryptography:- Generic PKC employs two keys that are mathematically related although knowledge of one key does not allow someone to easily determine the other key. One key is used to encrypt the plaintext and the other key is used to decrypt the ciphertext. No matter which key is applied first, but both the keys are required for the process to work. Because a pair of keys are required, this approach is also called asymmetric cryptography. for more update subscribe to mitigater.in and visit mitigater.in
thank you.
0 notes
mitigater · 5 years ago
Link
#blogs#cybersecurity#networking#ccna#ccnp#ccie#linux#cloudcomputing#cloud
#mitigater
1 note · View note