SCCI Digital Library and Forum

Network Security (V-U)

S# Lecture Course Institute Instructor Discipline
26
Information Security Assessments, Technical Assessment Techniques, Testing Viewpoints, Vulnerability Scanning (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
27
The Threat Environment (cont…), Employee and Ex-Employee (Insider) Threats (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
28
Introduction to Classical Cryptography (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
29
The Threat Environment, Basic Security Terminology, Case Study: The Tjx Data Breach (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
30
IPS Technologies, IPS Response Techniques, Common IPS Detection Methodologies (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
31
Traditional External Attackers, Classic Malware: Viruses and Worms, Trojan Horses and Rootkits (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
32
IPSEC (cont…), Attacks: Passive and Active (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
33
Link Encryption vs End-to-End Encryption, Encryption at Different Layers, Hardware vs Software Cryptography Systems, Email Standards (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
34
Trojan Horses and Rootkits (cont…), Other Malware Attacks (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
35
Twenty Critical Security Controls, Award-winning Security Products (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
36
MAC (cont…), CMAC, Types of Hashing Algorithms, Desired Features of Cryptographic Hash Functions, Hashing Algorithms used Today (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
37
Types of Firewalls (cont…), Firewall Configurations and Demilitarized Zone (DMZ), Distributed Firewalls (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
38
Message Integrity, Message Authentication Codes (MAC), HMAC Example, CBC-MAC (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
39
Types of Symmetric Systems, Data Encryption Standard (DES) (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
40
Methods of Encryption, Symmetric Cryptography, Asymmetric Cryptography, Symmetric vs Asymmetric Algorithms (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
41
Typical Cryptographic System Working, Secure Shell (SSH), Virtual Private Networks (VPNs), IPSEC (Internet Protocol Security) (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
42
Online Certificate Status Protocol (OCSP), Certificates and X.509, Registration Authority (RA), PKI Example, PKI Components, PKI Security Services (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
43
Web Application Security, Open Web Application Security Project (OWASP) (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
44
OWASP (cont…), OWASP top 10, Secure SDLC (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
45
PKI (cont…), PKI Components, Certificate Authority (CA), Functions of a Certificate Authority, Certificate Revocation List (CRL) (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences