Menu
|
111-222-292 (Ext: 245)
Home
|
About US
|
Creditors
|
Mentorship
|
Faq
Home
About US
Creditors
Mentorship
Faq
Lecture
SEARCH COURSES / LECTURES
Search Lectures
Search Courses
All Disciplines
Basic and Health Sciences
Biology
Chemistry
Mathematics
Physics
Medicine
Test Prep
Applied Sciences
Agricultural Science
Computer Science
Earth, Atmospheric, and Planetary Sciences
Energy
Engineering
Healthcare
Social Sciences
Business and Finance
Economics
English
History
Arts and Humanities
Law
Literature and Linguistics
Management
Marketing
Mass Communication
Philosophy
Physical Education
Political Science
Psychology
Sociology
All Levels
Undergraduate
School
College
Graduate
All Institutes
Harvard
Khan Academy
Khan Academy Urdu
MIT
Oxford
Stanford
UCI Open
Udacity
Virtual Education Project Pakistan (VEPP)
Virtual University
Yale University
Home
>>
Applied Sciences
>>
Computer Science
>>
Network Security (V-U)
Network Security (V-U)
(45 Lectures Available)
S#
Lecture
Course
Institute
Instructor
Discipline
1
Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), Blowfish, RC4, RC5, RC6, Review of Cryptography (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
2
Asymmetric Key Algorithms, Diffie Hellman Algorithm, RSA Algorithm (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
3
Common IPS Detection Methodologies (cont...), Stateful Protocol Analysis, Types of IDPS technologies (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
4
Course Introduction, Three Objectives of IT Security, Three Foundations of IT Security (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
5
Cryptography (cont...), One-Time Pad, Steganography, Types of Ciphers (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
6
Cryptography :Definitions & Concepts, Kerckhoff's Principle, Strength of the Cryptosystem, Services of Cryptosystems (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
7
DES (cont...), Triple DES (3DES) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
8
Difference between Public Key Cryptography and Public Key Infrastructure (PKI), One-Way Functions, El Gamal, Elliptic Curve Cryptosystems, Knapsack (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
9
Enterprise Network Architecture (Cont. 2) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
10
Enterprise Network Architecture (Cont. 3) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
11
Enterprise Network Architecture (cont...), Intrusion Detection and Prevention System (IDPS) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
12
Enterprise Network Architecture, Different Traffic Flows in the Enterprise, Implementing Security in the Enterprise (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
13
Firewalls, Types of Firewalls (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
14
Hackers, Social Engineering used by Hackers (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
15
Information Security Assessments, Technical Assessment Techniques, Testing Viewpoints, Vulnerability Scanning (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
16
Introduction to Classical Cryptography (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
17
IPS Technologies, IPS Response Techniques, Common IPS Detection Methodologies (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
18
IPSEC (cont...), Attacks: Passive and Active (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
19
Link Encryption vs End-to-End Encryption, Encryption at Different Layers, Hardware vs Software Cryptography Systems, Email Standards (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
20
MAC (cont...), CMAC, Types of Hashing Algorithms, Desired Features of Cryptographic Hash Functions, Hashing Algorithms used Today (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
21
Message Integrity, Message Authentication Codes (MAC), HMAC Example, CBC-MAC (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
22
Methods of Encryption, Symmetric Cryptography, Asymmetric Cryptography, Symmetric vs Asymmetric Algorithms (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
23
Online Certificate Status Protocol (OCSP), Certificates and X.509, Registration Authority (RA), PKI Example, PKI Components, PKI Security Services (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
24
OWASP (cont...), OWASP top 10, Secure SDLC (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
25
PKI (cont...), PKI Components, Certificate Authority (CA), Functions of a Certificate Authority, Certificate Revocation List (CRL) (V-U)
Network Security (V-U)
Virtual University
Nahil Mahmood
Applied Sciences
‹
1
2
›
Basic and Health Sciences
Biology
Chemistry
Mathematics
Physics
Medicine
Test Prep
Applied Sciences
Agricultural Science
Computer Science
Earth, Atmospheric, and Planetary Sciences
Energy
Engineering
Healthcare
Social Sciences
Business and Finance
Economics
English
History
Arts and Humanities
Law
Literature and Linguistics
Management
Marketing
Mass Communication
Philosophy
Physical Education
Political Science
Psychology
Sociology