SCCI Digital Library and Forum
Menu
Home
About Us
Video Library
eBooks
SCCI Forum
Home
»
Applied Sciences
»
Computer Science
»
Network Security (V-U)
»
Web Application Security, Open Web Application Security Project (OWASP) (V-U)
Web Application Security, Open Web Application Security Project (OWASP) (V-U)
Course:
Network Security (V-U)
Discipline:
Applied Sciences
Institute:
Virtual University
Instructor(s):
Nahil Mahmood
Level:
Graduate
Network Security (V-U)
Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), Blowfish, RC4, RC5, RC6, Review of Cryptography (V-U)
Asymmetric Key Algorithms, Diffie Hellman Algorithm, RSA Algorithm (V-U)
Common IPS Detection Methodologies (cont…), Stateful Protocol Analysis, Types of IDPS technologies (V-U)
Course Introduction, Three Objectives of IT Security, Three Foundations of IT Security (V-U)
Quantum Cryptography, Internet Security, Internet Protocols (V-U)
Cryptography (cont…), One-Time Pad, Steganography, Types of Ciphers (V-U)
Review of Link Encryption vs End-to-End Encryption, Email Standards (cont…) (V-U)
Cryptography :Definitions & Concepts, Kerckhoff's Principle, Strength of the Cryptosystem, Services of Cryptosystems (V-U)
Review of PKI Digital Certificates Certificate Structure and PKI Services, Key Management, Kerberos Protocol, Key Management Principles, Rules for Keys (V-U)
DES (cont…), Triple DES (3DES) (V-U)
Review of Symmetric Asymmetric and Hashing Algorithms, Digital Signatures, Digital Signature Standard (DSS), Public Key Infrastructure (PKI) (V-U)
Difference between Public Key Cryptography and Public Key Infrastructure (PKI), One-Way Functions, El Gamal, Elliptic Curve Cryptosystems, Knapsack (V-U)
Secure HTTP(S-HTTP), Secure Electronic Transaction (SET), Cookies and How They Work (V-U)
Enterprise Network Architecture (Cont. 2) (V-U)
Security Features on Switches, Layer 2 Security, Types of Layer 2 Attacks, Port Level Traffic Controls (V-U)
Enterprise Network Architecture (Cont. 3) (V-U)
Spanning Tree Protocol (STP) Features, Access Control Lists on Switches, Layer 2 Security Best Practices (V-U)
Enterprise Network Architecture (cont…), Intrusion Detection and Prevention System (IDPS) (V-U)
Symmetric Algorithms, Block Ciphers, Stream Ciphers, Hybrid Encryption Systems (V-U)
Enterprise Network Architecture, Different Traffic Flows in the Enterprise, Implementing Security in the Enterprise (V-U)