It & Software Online Course by Udemy, On Sale Here
Public-Private Key Cryptography, Hash Functions, End Point Authentication, TLS/SSL, IPsec in VPNs, Integrity Protection
An excellent training about Network & Security
Computer Network Security Protocols And Techniques
The aim of this course is to introduce the student to the area of computer Network Security. This course develops a basic understanding of the algorithms used to protect the flow of information in Computer networks and to understand some of the design choices behind these algorithms. The content of this course are as follows: Section 1: Introduction What is Computer Network Security? Friends And Enemies: Alice, Bob and EveSection 2: Principles Of Cryptography The Terminologies Of Cryptography Two Domains Of Cryptography-Symmetric Key Cryptography & Public Key Cryptography Traditional Ciphers and its Types Example Of Shift Cipher-Caesar Cipher Example of Transposition CipherSection 3: The Modern Ciphers DES and Triple DES Advanced Encryption Standard (AES) Modes of Operation for block cipher: ECB, CBC, CFB, OFB Section 4: Asymmetric key cryptography Rivest, Shamir, Adleman (RSA) Algorithm Diffie-Hellman Key Exchange Algorithm Man In The Middle Attack Section 5: Message Authentication-Integrity Protection Using Digital Signatures Hash Functions-MD5 and SHA-1 Role Of Certification Authorities in Public Key Encryption Section 6: End Point Authentication Scenarios to avoid man in the middle attack Section 7: Securing The E-mail Pretty Good Privacy (PGP) to secure e-mail Section 8: Transport Layer Security Using TLS/SSL TLS Security Services (TLS) Services The bigger picture-Toy TLS/SSL Example Actual TLS-SSL Cipher Suite Protocols used in actual TLS Handshake in Actual TLS Actual TLS Record Protocol Actual TLS Flow Diagram Section 9: Virtual Private Networks IPsec Protocol in VPNs IPsec Security Services IPSec Framework IPSec Security Association Internet Key Exchange (IKE): IKE Phase 1, IKE Phase 2 Authentication Header (AH) Vs Encapsulating Security Payload (ESP) Transport Versus Tunnel Mode Authentication Header (AH) Protocol Encapsulating Security Payload (ESP) Four Modes Of IPsec
Udemy is the leading global marketplace for learning and instruction
By connecting students all over the world to the best instructors, Udemy is helping individuals reach their goals and pursue their dreams.
Study anytime, anywhere.
Reviews
There are no reviews yet.