- 
	
    Introduction to Data Compression 5- 
				
                Data Compression (lossy and lossless) 08 minLecture1.1
- 
				
                Difference between Lossy vs lossless compression 06 minLecture1.2
- 
				
                Huffman and Run length Encoding ( Compression method part 1) 15 minLecture1.3
- 
				
                Arithmetic Coding ( Compression method part 2) 21 minLecture1.4
- 
				
                JPEG Compression 09 minLecture1.5
 
- 
				
                
- 
	
    Data Security 11- 
				
                Introduction to Cryptography and Security System 09 minLecture2.1
- 
				
                Security Goals and Mechanism 10 minLecture2.2
- 
				
                Symmetric Cipher 02 minLecture2.3
- 
				
                Mono Alphabetic Cipher 08 minLecture2.4
- 
				
                Poly Alphabetic Cipher 07 minLecture2.5
- 
				
                Substitution Cipher 14 minLecture2.6
- 
				
                Transposition Cipher 07 minLecture2.7
- 
				
                Stream and Block Cipher 04 minLecture2.8
- 
				
                DES Algorithm Full Working 12 minLecture2.9
- 
				
                DES key Generation Explain Step by Step 11 minLecture2.10
- 
				
                AES Algorithm Full working 26 minLecture2.11
 
- 
				
                
- 
	
    Number Theory and Asymmetric Key Cryptography 9- 
				
                Modes of Operation 08 minLecture3.1
- 
				
                Public Key cryptogrpahy 03 minLecture3.2
- 
				
                RSA Algorithm with Solved Example 14 minLecture3.3
- 
				
                Diffie Hellman 07 minLecture3.4
- 
				
                How to find modulus of Exponential Number (high power value ) 12 minLecture3.5
- 
				
                MD5 (Message Digest Algorithm) 24 minLecture3.6
- 
				
                SHA-1 Algorithm Full Working 23 minLecture3.7
- 
				
                MAC 07 minLecture3.8
- 
				
                Digital Signature Full working Explained 19 minLecture3.9
 
- 
				
                
- 
	
    Network Security 3- 
				
                Kerberos 08 minLecture4.1
- 
				
                Digital Certificate and X.509 10 minLecture4.2
- 
				
                SSL ( Secure Socket Layer protocol ) 18 minLecture4.3
 
- 
				
                
- 
	
    Extra 17- 
				
                DOS and DDOS Attack 10 minLecture5.1
- 
				
                IPSEC introduction 17 minLecture5.2
- 
				
                IP SEC Security Protocols 14 minLecture5.3
- 
				
                IPSEC Modes of Operation 10 minLecture5.4
- 
				
                IDS and its Types 12 minLecture5.5
- 
				
                Buffer Overflow and Buffer Overflow attack 09 minLecture5.6
- 
				
                Malicious Software ( Virus and worms ) 10 minLecture5.7
- 
				
                Virus and worms 13 minLecture5.8
- 
				
                SQL Injection 07 minLecture5.9
- 
				
                IDEA Algorithm Full Working Copy 14 minLecture5.10
- 
				
                Blowfish Algorithm Full working Copy 13 minLecture5.11
- 
				
                Confusion and Diffusion Copy 02 minLecture5.12
- 
				
                Meet in the Middle Copy 03 minLecture5.13
- 
				
                Phishing Attack Copy 11 minLecture5.14
- 
				
                Session Hijacking and Spoofing Attack Copy 11 minLecture5.15
- 
				
                OS Security Memory and Address Protection Copy 11 minLecture5.16
- 
				
                E commerce Security and Payment gateway Copy 09 minLecture5.17
 
- 
				
                
- 
	
    Encryption NOTES 9
