SCCI Digital Library and Forum
Menu
Home
About Us
Video Library
eBooks
SCCI Forum
Home
»
Applied Sciences
»
Computer Science
»
Network Security (V-U)
Network Security (V-U)
S#
Lecture
Course
Institute
Instructor
Discipline
1
Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), Blowfish, RC4, RC5, RC6, Review of Cryptography (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
2
Asymmetric Key Algorithms, Diffie Hellman Algorithm, RSA Algorithm (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
3
Common IPS Detection Methodologies (cont…), Stateful Protocol Analysis, Types of IDPS technologies (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
4
Course Introduction, Three Objectives of IT Security, Three Foundations of IT Security (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
5
Quantum Cryptography, Internet Security, Internet Protocols (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
6
Cryptography (cont…), One-Time Pad, Steganography, Types of Ciphers (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
7
Review of Link Encryption vs End-to-End Encryption, Email Standards (cont…) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
8
Cryptography :Definitions & Concepts, Kerckhoff's Principle, Strength of the Cryptosystem, Services of Cryptosystems (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
9
Review of PKI Digital Certificates Certificate Structure and PKI Services, Key Management, Kerberos Protocol, Key Management Principles, Rules for Keys (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
10
DES (cont…), Triple DES (3DES) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
11
Review of Symmetric Asymmetric and Hashing Algorithms, Digital Signatures, Digital Signature Standard (DSS), Public Key Infrastructure (PKI) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
12
Difference between Public Key Cryptography and Public Key Infrastructure (PKI), One-Way Functions, El Gamal, Elliptic Curve Cryptosystems, Knapsack (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
13
Secure HTTP(S-HTTP), Secure Electronic Transaction (SET), Cookies and How They Work (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
14
Enterprise Network Architecture (Cont. 2) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
15
Security Features on Switches, Layer 2 Security, Types of Layer 2 Attacks, Port Level Traffic Controls (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
16
Enterprise Network Architecture (Cont. 3) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
17
Spanning Tree Protocol (STP) Features, Access Control Lists on Switches, Layer 2 Security Best Practices (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
18
Enterprise Network Architecture (cont…), Intrusion Detection and Prevention System (IDPS) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
19
Symmetric Algorithms, Block Ciphers, Stream Ciphers, Hybrid Encryption Systems (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
20
Enterprise Network Architecture, Different Traffic Flows in the Enterprise, Implementing Security in the Enterprise (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
21
System and Server Security (cont…) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
22
System and Server Security (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
23
Firewalls, Types of Firewalls (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
24
Hackers, Social Engineering used by Hackers (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
25
Target Vulnerability Validation Techniques, Penetration Testing Overview and Phases (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
1
2
Next »