Information Security

Por: Swayam . en: , ,

Week 1 Day 1 : Introduction to Information Security Day 2 : Protection Vs Security Day 3 : Aspects of security   Week 2 Day 1 : Security problems Day 2 : User authentication Day 3 : Orange Book   Week 3 Day 1 : Security threats Day 2 : Program threats Day 3 : Worms and viruses   Week 4 Day 1 : Trojan horse and Trap door Day 2 : Stack and buffer overflow Day 3 : System threats   Week 5 Day 1 : Communication threats Day 2 : Introduction to Cryptography Day 3 : Substitution techniques-I   Week 6 Day 1 : Substitution techniques-II Day 2 : Transposition ciphers Day 3 : Overview of symmetric key algorithms   Week 7 Day 1 : Data Encryption standard Day 2 : Advanced Encryption standards Day 3 : The AES Cipher   Week 8 Day 1 : Public Key encryption Day 2 : RSA algorithm Day 3 : The security of RSA   Week 9 Day 1 : Diffie-Hellman key exchange Day 2 : ECC Cryptography Day 3 : Message authentication   Week 10 Day 1 : Cryptographic hash functions Day 2 : Digital signature Day 3 : Symmetric key and Public key signature   Week 11 Day 1 : Message digests Day 2 : Public key infrastructure Day 3 : Security mechanisms-An overview   Week 12 Day 1 : Auditing and logging Day 2 : Trip wire Day 3 : System call monitoring    

Plataforma