#1 Introduction & Need for Security- Cryptography, Information Security
#2 Security Approaches and Principles or Goals of Security- Cryptography |Information Security|
#3 Types Of Security Attacks- Active & Passive Attacks and their Types |Information Security|
#4 Security Services in Network Security | Information Security |
#5 Security Mechanisms In Network Security | Information Security |
#6 Model for Network Security | Information Security |
#7 Basics Of Network Security, Important Terminologies | Information Security |
#8 Encryption Techniques - Substitution & Transposition Techniques |Information Security|
#9 Monoalphabetic Ciphers & Polyalphabetic Ciphers - Encryption Techniques | Information Security |
#10 Caesar Cipher with Example - Encryption Technique | Information Security |
#11 Playfair Cipher with Example - Encryption Techniques | Information Technology |
#12 Hill Cipher With Example - Encryption Techniques | Information Security |
#13 One Time Pad / Vernam Cipher With Example - Encryption Techniques | Information Security |
#14 Rail Fence & Columnar Transposition With Example-Encryption Techniques|Information Security|
#15 Symmetric & Asymmetric Key Cryptography With Diagram |Information Security|
#16 Concept Of Steganography in Network Security |Information Security|
#17 Block Cipher Introduction & Design Principles Of Block Cipher |Information Security|
#18 Data Encryption Standard ( DES ) Algorithm |CNS|
#19 Advanced Encryption Standard ( AES ) Algorithm - Block Cipher Algorithm |CNS|
#20 Blowfish Algorithm - Block Cipher Algorithm |CNS|
#21 IDEA ( International Data Encryption Algorithm )- Block Cipher Algorithm |CNS|
#22 Block Cipher Modes Of Operation - Part 1 |CNS|
#23 Block Cipher Modes Of Operation - Part 2 |CNS|
#24 Stream Cipher - Working with Example |CNS|
#25 RC4 Algorithm - Block Cipher Algorithm |CNS|
#26 Symmetric Key Distribution - Methods |CNS|
#28. RSA Algorithm - Asymmetric key cryptography |CNS|
#27 Principles Of Asymmetric Key Cryptography |CNS|
#29. Diffie Hellman Key Exchange Algorithm - Asymmetric key cryptography |CNS|
#31 Key Distribution in Asymmetric key cryptography |CNS|
#32 Knapsack Algorithm with Example- Asymmetric key cryptography |CNS|
#33 Message Authentication & Authentication Functions in Cryptography |CNS|
#34 MD5 Algorithm ( Message Digest 5) Working and Example |CNS|
#38 SHA ( Secure Hash Algorithm )Algorithm with example |CNS|
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|
#36 HMAC (Hash Based) & CMAC (Cipher Based) |CNS|
#37 Digital Signature In Cryptography |CNS|
#39 Elgamal Digital Signature - Example & Working |CNS|
#42 Public key Infrastructure (PKI), Architecture Of PKI|CNS|
#40 Kerberos - Authentication Protocol, Working with diagram|CNS|
#41 X- 509 Authentication Service - Certificate and its Elements |CNS|
#43 Web Security Considerations in Cryptography |CNS|
#44 Secure Socket Layer (SSL), SSL protocol stack, SSL Record Protocol|CNS|
#45. SSL Handshake Protocol, SSL Change Cipher Protocol, SSL Alert Protocol |CNS|
#46 HTTPS ( Hyper Text Transfer Protocol ), HTTP VS HTTPS |CNS|
#47 Transport Layer Security & its Working |CNS|
#48 Secure Shell (SSH) Protocol & its Working |CNS|
#49 Wireless Security - Factors, Threats & Measures for Wireless Security |CNS|
#50 Mobile Device Security - Threats & Strategies for Security |CNS|
#1 Introduction & Need for Security- Cryptography, Information Security
#2 Security Approaches and Principles or Goals of Security- Cryptography |Information Security|
#3 Types Of Security Attacks- Active & Passive Attacks and their Types |Information Security|
#4 Security Services in Network Security | Information Security |
#5 Security Mechanisms In Network Security | Information Security |
#6 Model for Network Security | Information Security |
#7 Basics Of Network Security, Important Terminologies | Information Security |
#8 Encryption Techniques - Substitution & Transposition Techniques |Information Security|
#9 Monoalphabetic Ciphers & Polyalphabetic Ciphers - Encryption Techniques | Information Security |
#10 Caesar Cipher with Example - Encryption Technique | Information Security |
#11 Playfair Cipher with Example - Encryption Techniques | Information Technology |
#12 Hill Cipher With Example - Encryption Techniques | Information Security |
#13 One Time Pad / Vernam Cipher With Example - Encryption Techniques | Information Security |
#14 Rail Fence & Columnar Transposition With Example-Encryption Techniques|Information Security|
#15 Symmetric & Asymmetric Key Cryptography With Diagram |Information Security|
#16 Concept Of Steganography in Network Security |Information Security|
#17 Block Cipher Introduction & Design Principles Of Block Cipher |Information Security|
#18 Data Encryption Standard ( DES ) Algorithm |CNS|
للحصول على شهادة
- 1-
التسجيل
- 2- مشاهدة الكورس كاملا
- 3- متابعة نسبة اكتمال الكورس تدريجيا
- 4- بعد الانتهاء تظهر الشهادة في الملف الشخصي الخاص بك