The Linux command line allows you to control most aspects of program input and output. In this video, you’ll learn the techniques necessary to control the input and output streams and how to pipe output into the input or arguments of another program.
The information traversing the network can be a valuable source of forensic data. In this video, you’ll learn about some common data gathering techniques for network traffic data.
Symmetric encryption often uses block ciphers or stream ciphers to create ciphertext. In this video, you’ll learn how block and stream ciphers work and what methods these ciphers employ to keep your information private.