This site contains a number of material related to security, digital forensics, networking, and many other things. Please login for full access Login.
Access Bill's Blog pages: [here].
This page contains one of the most extensive Web sites for encryption, and includes secret key, public key and hashing methods. It includes important public key methods such as for RSA, along with secret keys methods of 3DES, AES and RC4.
This page contains a range of ciphers and codes, including Pigpen, Hashing (MD5, SHA-1) and Caeser Coding. Along with this it contains a calculator for the frequency analysis of ciphers.
This page contains a wide range of cipher challenges to undertake. Included within the challenges are graphical ciphers such as Pigpen, Semaphore, and Templar. Included are many of the key principles used within Cyber Security.
This page contains information on a range of methods using within data analysis. It includes examples using the 3Ps: Python, Pandas and Plotly, where we can analyse using Pandas and which integrates with Pandas. Our charts can be viewed using Plotly.
This page contains simulators for a Cisco Router, Switch, Airnonet, and PIX/ASA firewall. It contains a wide range of commands which are supported within Cisco certification.
This page contains a range of material related to networking and the IP protocol, including investigating subnet masking and IP address summarization.
This page contains includes the coverage of SQL, including commands for viewing and editing data. The pages include an example of SQL injection.
This page contains the coverage of Snort, Network Forensics, File Forensics and Wireshark. A key focus is on the analysis of network protocols, and the pages contain coverage of Wireshark analysis.
This page contains many unique tests, including ones for Cisco certifications, computer security and coding.
This page contains many unique tests including with fun tests.
This page contains many subject areas, including for Metasploit, IoT Security and Encryption. It also includes Data Loss Prevention (DLP), and Cisco Switching.
This page contains a background within Telecommunications, including examples of using Python for communication methods.
A few highlights
The following are a few highlights of our Web site:
Take a Test
Here are a few tests:
The following are a few sample modules: