Back
First Year
Second Year
Third Year
Fourth Year
First Year
Second Year
Third Year
Fourth Year
Cart
0
Register
Login
Curriculum
1 Section
9 Lessons
24 Weeks
Expand all sections
Collapse all sections
Cryptography and Security System
9
1.1
Index
1.2
Module 1 ( Introduction to Cryptography )
1.3
Module 2 ( Basics of Cryptography )
1.4
Module 3 ( Secret Key Cryptography )
1.5
Module 4 ( Public Key Cryptography )
1.6
Module 5 ( Cryptographic Hash Function )
1.7
Module 6 ( Authentication Application )
1.8
Module 7 ( Security and Firewalls)
1.9
Module 8 ( IP Security )
Cryptography and Security
System
Index
Module 1
-Introduction to Cryptography - 1
-System Security - 4
➔
Security attacks - 4
➔
Types of attacks - 5
➔
Difference between active and passive attack -8
-Security Goals -9
-Computer Criminals -11
➔
Methodology of hacking - 13
➔
Classification of hacker - 15
-Security Services - 16
-Security Mechanism - 19
Module 2
-
Basics of Cryptography -1
-Substitution techniques - 2
➔
Monoalphabetic cipher - 2
●
Ceaser ( additive cipher)
●
Multiplicative cipher
●
Affine cipher
➔
Polyalphabetic cipher - 5
●
Autokey cipher
●
Playfair cipher
●
Vigenere cipher
●
One time pad
-Block and Stream cipher - 9 -Confusion and diffusion -
12
Module 3
● Data Encryption Standard (DES) - 2 ● Key Scheduling
in DES - 10
●
Double DES - 14
●
Triple DES - 15
● Modes of Operation - 18
● IDEA -23
● Blowfish - 26
● CAST-128 - 30
Module 4
●
Public key cryptography - 2
●
Diffie hellman
algorithm - 4
●
RSA Algorithm - 11
Module 5
●
Digital signature - 1
●
DSA ( Digital Signature Algorithm ) - 3
●
MD 5 - 4
●
SHA 1 - 7
●
Difference Between Sha-1 and MD5 - 9
Module 6
●
X.509 Digital certificate - 1
●
Use of Digital signature - 2
●
PGP authentication and confidentiality in emails -3
●
Email Security - 4
●
Kerberos - 5
Module 7
●
what is a firewall? What are the firewall design
principle -1
●
What are the types of Firewalls - 2
●
Explain the significance of an Intrusion Detection
System for securing a network. Compare signature
based and anomaly based IDS. - 5
●
Viruses and their types - 7
●
Differentiate between Firewall and IDS. - 9
●
What are the various ways for memory and address
protection - 11
●
Explain Non- Malicious programming error - 12
Module 8
●
What is Denial of Service Attack? What are the
ways in which an attacker can mount a DOS attack on
a system - 1
●
SSL Protocol - 4
●
Explain packet-sniffing and packet-spoofing.
Explain session hijacking attack. - 7
●
Explain IPSEC Protocol For Security - 11
●
Explain Buffer Overflow Attack - 14
●
Explain Software Flaws with Example - 15
For Full Video Course visit
www.Lastmomenttuitions.com