Course Includes:
- Price: FREE
- Enrolled: 3685 students
- Language: English
- Certificate: Yes
- Difficulty: Beginner
In this course you will learn about cryptography and system security concepts.
This course provides an in-depth exploration of system security goals and concepts, focusing on confidentiality, integrity, availability, and related principles such as authentication and non-repudiation. It delves into classical and modern encryption techniques, including symmetric and asymmetric algorithms, and the application of these methods to solve problems related to data confidentiality and authentication. The course covers hashing algorithms for data integrity and the analysis of digital signature schemes to ensure secure communication. Students will also learn to design secure applications, analyze network vulnerabilities, and evaluate various attacks. The course includes an evaluation of firewalls and key security protocols such as SSL/TLS, IPSec, and PGP, preparing students to effectively implement and assess security measures in real-world scenarios.
Chapter 1 : Cryptography and Different Types of Ciphers with example
Cryptography and its categories
Different types of ciphers - Substitution Cipher
Caesar Cipher and Generalized Caesar Cipher
Caesar Cipher Example 2
Affine Cipher
Playfair Cipher
Playfair Cipher Example
Vigenere Cipher: Vigenere Table Method
Vigenere Cipher: Keyword Method
Transposition Cipher: Keyless Transposition Cipher
Transposition Cipher: Keyed Transposition Cipher
Chapter 2 : Public Key Cryptography
Key Distribution Center (KDC)
Diffie Hellman Key Exchange Algorithm
Diffie Hellman Example
RSA Algorithm - Steps
RSA Example 1
RSA Example 2
RSA Example 3
Man in the Middle Attack Example
Chapter 3 : Hash Function, MAC, CMAC and HMAC
What is hash function?
Properties of hash function
Message Authentication Code (MAC)
Nested MAC
CMAC
HMAC
Chapter 4 : Digital Certificate
Digital Certificate
X.509 Digital Certificate Format
Chapter 5 : Authentication
Authentication and Authorization
Multi-factor Authentication
Chapter 6 : TCP/IP Vulnerabilities
TCP/IP Vulnerabilities
Packet Sniffing
ARP spoofing
DNS Spoofing
Port Scanning
IP spoofing
TCP Syn Flood
Chapter 7 : Internet Security Protocols
Introduction
SSL
SSL Protocol Stack
TLS
IPSec
IPSec Modes of Operations: Transport and Tunnel Mode
IP Sec Protocols : AH and ESP
Chapter 8 : Firewall
What is Firewall and its types
Packet Filters Firewall
Circuit Level Gateway Firewall
Application Level Firewall
Stateful Multilayer Firewall
Chapter 9 : Intrusion Detection System (IDS)
What is Intrusion and its types
IDS and its types
Host based IDS
Network based IDS
Hybrid IDS
Signature based IDS
Anomaly based IDS
Thanks for joining my course, let's get started!