Alright, 3 hours isn't a ton of time together but here are 100 hours of top-notch videos, lectures, and problems to help you learn all the crypto you want:
First, my notes at https://crypto.prof.ninja/notes have the UD Capture lectures availble too: https://capture.udel.edu/channel/CPEG472%2BSPRING%2B2019%2BAPPLIED%2BCRYPTO/111929711
(That's a 3 credit hour 400/600 level course that starts where you are and walks through everything.)
Problems that went with that course: https://crypto.prof.ninja/ctf
Video walkthrough of problem 2: https://udel.zoom.us/rec/play/tZJ4Jr_-rjM3E92R5ASDC_QqW9W6fP2shycY_fcIxEbkBiFXZwGnN-dBYrbPzQcvvCI1TGtaBZ4tM6_B?startTime=1584031750000
Problems 3 and 4: https://udel.zoom.us/rec/play/v8IuJuD5rWg3H9CdsgSDB6MtW9XsLqus0iFL8vEKzx60BXlQZFf1MrMQZLGEnWfplJOk446ccAHKqqKy?startTime=1584039228000
Problems 5 and 6: https://udel.zoom.us/rec/play/uJx_JeqhqD83HYeV4wSDCv54W9S7fK2shCMeq_BbmBu8UHcAZlD1ZbMUa-KjQvbHWXU7BK_s1_DD_LHo?startTime=1584041738000
Some of those problems: https://udel.zoom.us/rec/share/_sNNH6_Nx0VIE4XR4kXjALR-NL_kaaa8gyVP_PYImEi1WnLSOz86RZPfv5WpyvkK
Coppersmith is glorious: https://github.com/mimoo/RSA-and-LLL-attacks/blob/master/coppersmith.sage
Explaining Modular Arithmetic: Modular Inverses: https://udel.zoom.us/rec/share/-_UtLOzg20hIZ5XS2AbdZpQBO7jBT6a81ykW-PIPykabO5FDK8t3r6PgLoIVyDbQ?startTime=1585076456000
Assessing strength of Diffie-Hellman / El Gamal / Discrete Log: https://udel.zoom.us/rec/share/-_UtLOzg20hIZ5XS2AbdZpQBO7jBT6a81ykW-PIPykabO5FDK8t3r6PgLoIVyDbQ?startTime=1585077958000
Attempting a coppersmith RSA with leaked info: https://udel.zoom.us/rec/share/-_UtLOzg20hIZ5XS2AbdZpQBO7jBT6a81ykW-PIPykabO5FDK8t3r6PgLoIVyDbQ?startTime=1585079238000
Canonical CTF problems for Crypto: one time pad and XOR encodings: base64, ascii, hex, rot13, historical stuff Block cipher problems Pseudo Random Number Guessing Stream Ciphers (rarely) RSA Diffie-Hellman ECC Shamir Secret Sharing El Gamal Hash Extension HMAC /MAC /GCM tag forgeries PGP
Crypto Workshop Video # 1: https://udel.zoom.us/rec/share/4cJWPo3LqUROXtLBzh3vAfF-PIDcT6a81yEZrKYPmEmEeXUxUEw_aH6A9Sbr878d?startTime=1585754085000
In crypto workshop today we pulled off man in the middle attacks, forced weak params, and solved vanilla diffie-hellman key exchanges: https://udel.zoom.us/rec/share/v514I_bArj5IQ6fi7UzxaoQ9H6u4X6a8h3VIq6VYyUZFC_iviPNiJc5ncPZ512vr?startTime=1587569434000