Lecture

Right Arrow

SEARCH COURSES / LECTURES

Left Arrow

Network Security (V-U)

(45 Lectures Available)

S# Lecture Course Institute Instructor Discipline
1
  • Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), Blowfish, RC4, RC5, RC6, Review of Cryptography (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
2
  • Asymmetric Key Algorithms, Diffie Hellman Algorithm, RSA Algorithm (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
3
  • Common IPS Detection Methodologies (cont...), Stateful Protocol Analysis, Types of IDPS technologies (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
4
  • Course Introduction, Three Objectives of IT Security, Three Foundations of IT Security (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
5
  • Cryptography (cont...), One-Time Pad, Steganography, Types of Ciphers (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
6
  • Cryptography :Definitions & Concepts, Kerckhoff's Principle, Strength of the Cryptosystem, Services of Cryptosystems (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
7
  • DES (cont...), Triple DES (3DES) (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
8
  • Difference between Public Key Cryptography and Public Key Infrastructure (PKI), One-Way Functions, El Gamal, Elliptic Curve Cryptosystems, Knapsack (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
9
  • Enterprise Network Architecture (Cont. 2) (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
10
  • Enterprise Network Architecture (Cont. 3) (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
11
  • Enterprise Network Architecture (cont...), Intrusion Detection and Prevention System (IDPS) (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
12
  • Enterprise Network Architecture, Different Traffic Flows in the Enterprise, Implementing Security in the Enterprise (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
13
  • Firewalls, Types of Firewalls (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
14
  • Hackers, Social Engineering used by Hackers (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
15
  • Information Security Assessments, Technical Assessment Techniques, Testing Viewpoints, Vulnerability Scanning (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
16
  • Introduction to Classical Cryptography (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
17
  • IPS Technologies, IPS Response Techniques, Common IPS Detection Methodologies (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
18
  • IPSEC (cont...), Attacks: Passive and Active (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
19
  • Link Encryption vs End-to-End Encryption, Encryption at Different Layers, Hardware vs Software Cryptography Systems, Email Standards (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
20
  • MAC (cont...), CMAC, Types of Hashing Algorithms, Desired Features of Cryptographic Hash Functions, Hashing Algorithms used Today (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
21
  • Message Integrity, Message Authentication Codes (MAC), HMAC Example, CBC-MAC (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
22
  • Methods of Encryption, Symmetric Cryptography, Asymmetric Cryptography, Symmetric vs Asymmetric Algorithms (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
23
  • Online Certificate Status Protocol (OCSP), Certificates and X.509, Registration Authority (RA), PKI Example, PKI Components, PKI Security Services (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
24
  • OWASP (cont...), OWASP top 10, Secure SDLC (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences
25
  • PKI (cont...), PKI Components, Certificate Authority (CA), Functions of a Certificate Authority, Certificate Revocation List (CRL) (V-U)
Network Security (V-U) Virtual University Nahil Mahmood Applied Sciences