Python for Cybersecurity

  1. Cryptography and Security Protocols
    1. Cryptographic Hash Functions
      1. Hash Algorithm Implementation
        1. MD5 Usage and Limitations
          1. SHA-1 Usage and Limitations
            1. SHA-256 and SHA-3 Families
              1. BLAKE2 and Modern Alternatives
              2. hashlib Module Usage
                1. Password Hashing
                  1. Salt Generation
                    1. Key Stretching
                      1. bcrypt and scrypt Usage
                      2. File Integrity Verification
                        1. Digital Signatures
                        2. Symmetric Encryption
                          1. Symmetric Cryptography Concepts
                            1. Advanced Encryption Standard (AES)
                              1. AES Modes of Operation
                                1. Key Generation
                                  1. Initialization Vectors
                                  2. cryptography Library Usage
                                    1. Fernet Symmetric Encryption
                                      1. Low-Level Cryptographic Primitives
                                      2. Key Management
                                        1. Key Generation
                                          1. Key Storage
                                            1. Key Rotation
                                          2. Asymmetric Encryption
                                            1. Public Key Cryptography Concepts
                                              1. RSA Implementation
                                                1. Key Pair Generation
                                                  1. Encryption and Decryption
                                                    1. Digital Signatures
                                                    2. Elliptic Curve Cryptography
                                                      1. Key Exchange Protocols
                                                        1. Certificate Handling
                                                        2. Steganography Techniques
                                                          1. Image Steganography
                                                            1. LSB Steganography
                                                              1. Image Format Manipulation
                                                                1. Steganalysis Techniques
                                                                2. File Steganography
                                                                  1. Hidden Partition Creation
                                                                    1. Metadata Manipulation
                                                                      1. Container File Techniques
                                                                      2. Network Steganography
                                                                        1. Covert Channels
                                                                          1. Protocol Steganography