-
About The Course 0
No items in this section -
[ CNS ] Module 01:- Introduction to Network Security & Cryptography 8
-
Introduction to Cryptography and Security System 09 minLecture2.1
-
Security Goals and Mechanism 10 minLecture2.2
-
Symmetric Cipher 02 minLecture2.3
-
Mono Alphabetic Cipher 08 minLecture2.4
-
Poly Alphabetic Cipher 07 minLecture2.5
-
Substitution Cipher 14 minLecture2.6
-
Transposition Cipher 07 minLecture2.7
-
Introduction to Computer NetworksLecture2.8
-
-
[ CNS ] Module 02:- Cryptography: Key management, Distribution and Use 12
-
Stream and Block Cipher 04 minLecture3.1
-
Modes of Operation 08 minLecture3.2
-
DES Algorithm Full Working 12 minLecture3.3
-
DES key Generation Explain Step by Step 11 minLecture3.4
-
AES Algorithm Full working 26 minLecture3.5
-
Public Key cryptogrpahy 03 minLecture3.6
-
RSA Algorithm with Solved Example 14 minLecture3.7
-
SHA-1 Algorithm Full Working 23 minLecture3.8
-
MAC 07 minLecture3.9
-
Digital Signature Full working Explained 19 minLecture3.10
-
Kerberos 08 minLecture3.11
-
Digital Certificate and X.509 10 minLecture3.12
-
-
[ CNS ] Module 03:- Malicious Software 5
-
Malicious Software ( Virus and worms ) 10 minLecture4.1
-
DOS and DDOS Attack 10 minLecture4.2
-
Virus and worms 13 minLecture4.3
-
Malware 16 minLecture4.4
-
Types of Malware 23 minLecture4.5
-
-
[ CNS ] Module 04:- IP Security, Transport level security and Email Se 4
-
IPSEC introduction 17 minLecture5.1
-
IP SEC Security Protocols 14 minLecture5.2
-
IPSEC Modes of Operation 10 minLecture5.3
-
SSL ( Secure Socket Layer protocol ) 18 minLecture5.4
-
-
[ CNS ] Module 05:- Network Security Management 3
-
network security management 06 minLecture6.1
-
SNMP v3 Architecture 09 minLecture6.2
-
Network Access Control With Use Cases 10 minLecture6.3
-
-
[ CNS ] Module 06:- System Security 3
-
IDS and its Types 12 minLecture7.1
-
Firewall & types 19 minLecture7.2
-
Firewall Design Principles 17 minLecture7.3
-
-
[ CNS ] NOTES 9
-
[ CNS ] IMP 6
-
[ CNS ] Viva 7
-
[ CNS ] Extra 13
-
Diffie Hellman 07 minLecture11.1
-
MD5 (Message Digest Algorithm) 24 minLecture11.2
-
How to find modulus of Exponential Number (high power value ) 12 minLecture11.3
-
Buffer Overflow and Buffer Overflow attack 09 minLecture11.4
-
SQL Injection 07 minLecture11.5
-
IDEA Algorithm Full Working 14 minLecture11.6
-
Blowfish Algorithm Full working 13 minLecture11.7
-
Confusion and Diffusion 02 minLecture11.8
-
Meet in the Middle 03 minLecture11.9
-
Phishing Attack 11 minLecture11.10
-
Session Hijacking and Spoofing Attack 11 minLecture11.11
-
OS Security Memory and Address Protection 11 minLecture11.12
-
E commerce Security and Payment gateway 09 minLecture11.13
-
This content is protected, please login and enroll course to view this content!
Next
Phishing Attack

