-
Cryptography and Security System 9
-
Lecture1.1
-
Lecture1.2
-
Lecture1.3
-
Lecture1.4
-
Lecture1.5
-
Lecture1.6
-
Lecture1.7
-
Lecture1.8
-
Lecture1.9
-
Cryptography and Security
System
Index
Module 1
-Introduction to Cryptography - 1
-System Security - 4
➔Security attacks - 4
➔Types of attacks - 5
➔Difference between active and passive attack -8
-Security Goals -9
-Computer Criminals -11
➔Methodology of hacking - 13
➔Classification of hacker - 15
-Security Services - 16
-Security Mechanism - 19
Module 2
-Basics of Cryptography -1
-Substitution techniques - 2
➔Monoalphabetic cipher - 2
● Ceaser ( additive cipher)
● Multiplicative cipher
● Affine cipher
➔Polyalphabetic cipher - 5
● Autokey cipher
● Playfair cipher
● Vigenere cipher
● One time pad
-Block and Stream cipher - 9 -Confusion and diffusion -
12
Module 3
● Data Encryption Standard (DES) - 2 ● Key Scheduling
in DES - 10 ● Double DES - 14
● Triple DES - 15
● Modes of Operation - 18
● IDEA -23
● Blowfish - 26
● CAST-128 - 30
Module 4
● Public key cryptography - 2 ● Diffie hellman
algorithm - 4 ● RSA Algorithm - 11
Module 5
● Digital signature - 1
● DSA ( Digital Signature Algorithm ) - 3
● MD 5 - 4
● SHA 1 - 7
● Difference Between Sha-1 and MD5 - 9
Module 6
● X.509 Digital certificate - 1
● Use of Digital signature - 2
● PGP authentication and confidentiality in emails -3
● Email Security - 4
● Kerberos - 5
Module 7
● what is a firewall? What are the firewall design
principle -1 ● What are the types of Firewalls - 2
● Explain the significance of an Intrusion Detection
System for securing a network. Compare signature
based and anomaly based IDS. - 5
● Viruses and their types - 7
● Differentiate between Firewall and IDS. - 9
● What are the various ways for memory and address
protection - 11
● Explain Non- Malicious programming error - 12
Module 8
● What is Denial of Service Attack? What are the
ways in which an attacker can mount a DOS attack on
a system - 1 ● SSL Protocol - 4
● Explain packet-sniffing and packet-spoofing.
Explain session hijacking attack. - 7
● Explain IPSEC Protocol For Security - 11
● Explain Buffer Overflow Attack - 14
● Explain Software Flaws with Example - 15
For Full Video Course visit