-
Introduction to Data Compression 5
-
Data Compression (lossy and lossless) 08 minLecture1.1
-
Difference between Lossy vs lossless compression 06 minLecture1.2
-
Huffman and Run length Encoding ( Compression method part 1) 15 minLecture1.3
-
Arithmetic Coding ( Compression method part 2) 21 minLecture1.4
-
JPEG Compression 09 minLecture1.5
-
-
Data Security 11
-
Introduction to Cryptography and Security System 09 minLecture2.1
-
Security Goals and Mechanism 10 minLecture2.2
-
Symmetric Cipher 02 minLecture2.3
-
Mono Alphabetic Cipher 08 minLecture2.4
-
Poly Alphabetic Cipher 07 minLecture2.5
-
Substitution Cipher 14 minLecture2.6
-
Transposition Cipher 07 minLecture2.7
-
Stream and Block Cipher 04 minLecture2.8
-
DES Algorithm Full Working 12 minLecture2.9
-
DES key Generation Explain Step by Step 11 minLecture2.10
-
AES Algorithm Full working 26 minLecture2.11
-
-
Number Theory and Asymmetric Key Cryptography 9
-
Modes of Operation 08 minLecture3.1
-
Public Key cryptogrpahy 03 minLecture3.2
-
RSA Algorithm with Solved Example 14 minLecture3.3
-
Diffie Hellman 07 minLecture3.4
-
How to find modulus of Exponential Number (high power value ) 12 minLecture3.5
-
MD5 (Message Digest Algorithm) 24 minLecture3.6
-
SHA-1 Algorithm Full Working 23 minLecture3.7
-
MAC 07 minLecture3.8
-
Digital Signature Full working Explained 19 minLecture3.9
-
-
Network Security 3
-
Kerberos 08 minLecture4.1
-
Digital Certificate and X.509 10 minLecture4.2
-
SSL ( Secure Socket Layer protocol ) 18 minLecture4.3
-
-
Extra 17
-
DOS and DDOS Attack 10 minLecture5.1
-
IPSEC introduction 17 minLecture5.2
-
IP SEC Security Protocols 14 minLecture5.3
-
IPSEC Modes of Operation 10 minLecture5.4
-
IDS and its Types 12 minLecture5.5
-
Buffer Overflow and Buffer Overflow attack 09 minLecture5.6
-
Malicious Software ( Virus and worms ) 10 minLecture5.7
-
Virus and worms 13 minLecture5.8
-
SQL Injection 07 minLecture5.9
-
IDEA Algorithm Full Working Copy 14 minLecture5.10
-
Blowfish Algorithm Full working Copy 13 minLecture5.11
-
Confusion and Diffusion Copy 02 minLecture5.12
-
Meet in the Middle Copy 03 minLecture5.13
-
Phishing Attack Copy 11 minLecture5.14
-
Session Hijacking and Spoofing Attack Copy 11 minLecture5.15
-
OS Security Memory and Address Protection Copy 11 minLecture5.16
-
E commerce Security and Payment gateway Copy 09 minLecture5.17
-
-
Encryption NOTES 9
