محتوى الدورة
#1 Introduction & Need for Security- Cryptography, Information Security #2 Security Approaches and Principles or Goals of Security- Cryptography |Information Security| #3 Types Of Security Attacks- Active & Passive Attacks and their Types |Information Security| #4 Security Services in Network Security | Information Security | #5 Security Mechanisms In Network Security | Information Security | #6 Model for Network Security | Information Security | #7 Basics Of Network Security, Important Terminologies | Information Security | #8 Encryption Techniques - Substitution & Transposition Techniques |Information Security| #9 Monoalphabetic Ciphers & Polyalphabetic Ciphers - Encryption Techniques | Information Security | #10 Caesar Cipher with Example - Encryption Technique | Information Security | #11 Playfair Cipher with Example - Encryption Techniques | Information Technology | #12 Hill Cipher With Example - Encryption Techniques | Information Security | #13 One Time Pad / Vernam Cipher With Example - Encryption Techniques | Information Security | #14 Rail Fence & Columnar Transposition With Example-Encryption Techniques|Information Security| #15 Symmetric & Asymmetric Key Cryptography With Diagram |Information Security| #16 Concept Of Steganography in Network Security |Information Security| #17 Block Cipher Introduction & Design Principles Of Block Cipher |Information Security| #18 Data Encryption Standard ( DES ) Algorithm |CNS| #19 Advanced Encryption Standard ( AES ) Algorithm - Block Cipher Algorithm |CNS| #20 Blowfish Algorithm - Block Cipher Algorithm |CNS| #21 IDEA ( International Data Encryption Algorithm )- Block Cipher Algorithm |CNS| #22 Block Cipher Modes Of Operation - Part 1 |CNS| #23 Block Cipher Modes Of Operation - Part 2 |CNS| #24 Stream Cipher - Working with Example |CNS| #25 RC4 Algorithm - Block Cipher Algorithm |CNS| #26 Symmetric Key Distribution - Methods |CNS| #28. RSA Algorithm - Asymmetric key cryptography |CNS| #27 Principles Of Asymmetric Key Cryptography |CNS| #29. Diffie Hellman Key Exchange Algorithm - Asymmetric key cryptography |CNS| #30 Elgamal Cryptography Algorithm - Asymmetric key cryptography |CNS| #31 Key Distribution in Asymmetric key cryptography |CNS| #32 Knapsack Algorithm with Example- Asymmetric key cryptography |CNS| #33 Message Authentication & Authentication Functions in Cryptography |CNS| #34 MD5 Algorithm ( Message Digest 5) Working and Example |CNS| #38 SHA ( Secure Hash Algorithm )Algorithm with example |CNS| #35 MAC ( Message Authentication Code ) - Working and Significance |CNS| #36 HMAC (Hash Based) & CMAC (Cipher Based) |CNS| #37 Digital Signature In Cryptography |CNS| #39 Elgamal Digital Signature - Example & Working |CNS| #42 Public key Infrastructure (PKI), Architecture Of PKI|CNS| #40 Kerberos - Authentication Protocol, Working with diagram|CNS| #41 X- 509 Authentication Service - Certificate and its Elements |CNS| #43 Web Security Considerations in Cryptography |CNS| #44 Secure Socket Layer (SSL), SSL protocol stack, SSL Record Protocol|CNS| #45. SSL Handshake Protocol, SSL Change Cipher Protocol, SSL Alert Protocol |CNS| #46 HTTPS ( Hyper Text Transfer Protocol ), HTTP VS HTTPS |CNS| #47 Transport Layer Security & its Working |CNS| #48 Secure Shell (SSH) Protocol & its Working |CNS| #49 Wireless Security - Factors, Threats & Measures for Wireless Security |CNS| #50 Mobile Device Security - Threats & Strategies for Security |CNS| #1 Introduction & Need for Security- Cryptography, Information Security #2 Security Approaches and Principles or Goals of Security- Cryptography |Information Security| #3 Types Of Security Attacks- Active & Passive Attacks and their Types |Information Security| #4 Security Services in Network Security | Information Security | #5 Security Mechanisms In Network Security | Information Security | #6 Model for Network Security | Information Security | #7 Basics Of Network Security, Important Terminologies | Information Security | #8 Encryption Techniques - Substitution & Transposition Techniques |Information Security| #9 Monoalphabetic Ciphers & Polyalphabetic Ciphers - Encryption Techniques | Information Security | #10 Caesar Cipher with Example - Encryption Technique | Information Security | #11 Playfair Cipher with Example - Encryption Techniques | Information Technology | #12 Hill Cipher With Example - Encryption Techniques | Information Security | #13 One Time Pad / Vernam Cipher With Example - Encryption Techniques | Information Security | #14 Rail Fence & Columnar Transposition With Example-Encryption Techniques|Information Security| #15 Symmetric & Asymmetric Key Cryptography With Diagram |Information Security| #16 Concept Of Steganography in Network Security |Information Security| #17 Block Cipher Introduction & Design Principles Of Block Cipher |Information Security| #18 Data Encryption Standard ( DES ) Algorithm |CNS|

للحصول على شهادة

  • 1- التسجيل
  • 2- مشاهدة الكورس كاملا
  • 3- متابعة نسبة اكتمال الكورس تدريجيا
  • 4- بعد الانتهاء تظهر الشهادة في الملف الشخصي الخاص بك