Computer Network Security Protocols And Techniques




Computer Network Security Protocols And Techniques

The aim of this course is to introduce the student to the area of computer Network Security. This course develops a basic understanding of the algorithms used to protect the flow of information in Computer networks and to understand some of the design choices behind these algorithms.

The content of this course are as follows:


Section 1: Introduction

                What is Computer Network Security?

                Friends And Enemies: Alice, Bob and Eve

Section 2: Principles Of Cryptography

                The Terminologies Of Cryptography

                Two Domains Of Cryptography-Symmetric Key Cryptography & Public Key Cryptography

                Traditional Ciphers and its Types

                Example Of Shift Cipher-Caesar Cipher

                Example of Transposition Cipher

Section 3: The Modern Ciphers

                DES and Triple DES

                Advanced Encryption Standard (AES)

                Modes of Operation for block cipher: ECB, CBC,CFB, OFB

Section 4: Asymmetric key cryptography

                 Rivest, Shamir, Adleman (RSA) Algorithm

                 Diffie-Hellman Key Exchange Algorithm

                 Man In The Middle Attack

Section 5: Message Authentication-Integrity Protection Using Digital Signatures

                  Hash Functions-MD5 and SHA-1

                  Role Of Certification Authorities in Public Key Encryption

Section 6: End Point Authentication Scenarios to avoid man in the middle attack

Section 7: Securing The E-mail

                  Pretty Good Privacy (PGP) to secure e-mail

Section 8: Transport Layer Security Using TLS/SSL

                  TLS Security Services (TLS) Services

                  The bigger picture-Toy TLS/SSL Example

                   Actual TLS-SSL Cipher Suite

                   Protocols used in actual TLS

                   Handshake in Actual TLS

                   Actual TLS Record Protocol

                   Actual TLS Flow Diagram

Section 9:  Virtual Private Networks

                   IPsec Protocol in VPNs

                   IPsec Security Services

                   IPSec Framework

                   IPSec Security Association

                   Internet Key Exchange (IKE): IKE Phase 1, IKE Phase 2

                   Authentication Header (AH) Vs Encapsulating Security Payload (ESP)

                   Transport Versus Tunnel Mode

                   Authentication Header (AH) Protocol

                   Encapsulating Security Payload (ESP)

                   Four Modes Of IPsec


Public-Private Key Cryptography, Hash Functions, End Point Authentication, TLS/SSL, IPsec in VPNs, Integrity Protection

Url: View Details

What you will learn
  • Computer Network security Alogorithms
  • Symmetric And Asymmetric Key Cryptography
  • Traditional And Modern Ciphers

Rating: 3.95

Level: All Levels

Duration: 3.5 hours

Instructor: Dr. Moazzam Tiwana


Courses By:   0-9  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z 

About US

The display of third-party trademarks and trade names on this site does not necessarily indicate any affiliation or endorsement of course-link.com.


© 2021 course-link.com. All rights reserved.
View Sitemap