Curriculum
- 6 Sections
- 54 Lessons
- 24 Weeks
Expand all sectionsCollapse all sections
- Introduction to Data Compression5
- Data Security11
- 2.1Introduction to Cryptography and Security System9 Minutes
- 2.2Security Goals and Mechanism10 Minutes
- 2.3Symmetric Cipher2 Minutes
- 2.4Mono Alphabetic Cipher8 Minutes
- 2.5Poly Alphabetic Cipher7 Minutes
- 2.6Substitution Cipher14 Minutes
- 2.7Transposition Cipher7 Minutes
- 2.8Stream and Block Cipher4 Minutes
- 2.9DES Algorithm Full Working12 Minutes
- 2.10DES key Generation Explain Step by Step11 Minutes
- 2.11AES Algorithm Full working26 Minutes
- Number Theory and Asymmetric Key Cryptography9
- 3.1Modes of Operation8 Minutes
- 3.2Public Key cryptogrpahy3 Minutes
- 3.3RSA Algorithm with Solved Example14 Minutes
- 3.4Diffie Hellman7 Minutes
- 3.5How to find modulus of Exponential Number (high power value )12 Minutes
- 3.6MD5 (Message Digest Algorithm)24 Minutes
- 3.7SHA-1 Algorithm Full Working23 Minutes
- 3.8MAC7 Minutes
- 3.9Digital Signature Full working Explained19 Minutes
- Network Security3
- Extra17
- 5.1DOS and DDOS Attack10 Minutes
- 5.2IPSEC introduction17 Minutes
- 5.3IP SEC Security Protocols14 Minutes
- 5.4IPSEC Modes of Operation10 Minutes
- 5.5IDS and its Types12 Minutes
- 5.6Buffer Overflow and Buffer Overflow attack9 Minutes
- 5.7Malicious Software ( Virus and worms )10 Minutes
- 5.8Virus and worms13 Minutes
- 5.9SQL Injection7 Minutes
- 5.10IDEA Algorithm Full Working Copy14 Minutes
- 5.11Blowfish Algorithm Full working Copy13 Minutes
- 5.12Confusion and Diffusion Copy2 Minutes
- 5.13Meet in the Middle Copy3 Minutes
- 5.14Phishing Attack Copy11 Minutes
- 5.15Session Hijacking and Spoofing Attack Copy11 Minutes
- 5.16OS Security Memory and Address Protection Copy11 Minutes
- 5.17E commerce Security and Payment gateway Copy9 Minutes
- Encryption NOTES9