Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cryptography and Network Security - Complete Course

Sundeep Saradhi Kanthety via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn comprehensive cryptography and network security fundamentals through this extensive video course covering essential information security concepts from basic principles to advanced protocols. Master network security basics including encryption, decryption, and various attack types while exploring both active and passive security threats. Understand core security services such as authentication, confidentiality, and information security frameworks that protect digital communications. Dive deep into cryptographic algorithms starting with classical techniques like substitution ciphers (Caesar and Playfair) and transposition methods (Rail Fence and Row Transposition). Explore modern symmetric encryption through block cipher modes including ECB, CBC, CFB, OFB, and CTR, then examine the Feistel structure and detailed implementations of DES and AES algorithms with step-by-step examples. Advance to public key cryptography by studying the RSA algorithm and Diffie-Hellman key exchange protocol for secure key distribution. Investigate message authentication mechanisms comparing MAC, hash functions, and encryption methods, followed by detailed explanations of MD5, SHA-512, and HMAC algorithms for data integrity verification. Examine digital signature systems through DSA algorithm implementation and explore authentication protocols including Kerberos for network security. Study digital certificate management with comprehensive coverage of X.509 standards and Pretty Good Privacy (PGP) for email security using public key cryptography. Complete your understanding with network security protocols including IP Security (IPSec) covering both Authentication Header and Encapsulating Security Payload components, Secure Socket Layer (SSL) protocol analysis including record, handshake, and alert protocols, and Secure Electronic Transaction (SET) protocol for e-commerce security applications.

Syllabus

01-Network Security Basics Explained | Information Security, Encryption & Decryption for Beginners
02-Types of Attacks in Network Security | Active vs Passive Attacks | Cryptography &Network Security
03-Security Services in Network Security | Authentication, Confidentiality & InfoSec Explained
04-Understanding Cryptographic Algorithms | Network Security & InfoSec Concepts
05-Substitution Techniques in Network Security | Caesar Cipher & Playfair Cipher Explained
06-Transposition Techniques in Network Security | Rail Fence & Row Transposition Cipher Explained
07-Network Security: Block Cipher Modes | ECB, CBC, CFB, OFB & CTR Explained
08-Feistel Structure in Network Security | Encryption Model Explained with Example
09-DES Algorithm in Network Security | Step-by-Step Explanation with Example
10-AES in Network Security | Advanced Encryption Standard | Step-by-Step Working of AES Algorithm
11-Learn RSA Algorithm Step-by-Step | Public Key Encryption in Network Security
12-Diffie-Hellman Key Exchange | Step-by-Step Guide | Secure Key Exchange Made Simple
13-Message Authentication in Cryptography | MAC vs Hash Functions vs Encryption
14-MD5 Algorithm Explained | Step-by-Step Explanation | Message Digest Algorithm
15-SHA-512 Algorithm Explained | Secure Hash Algorithm | Network Security Made Simple
16-HMAC Algorithm Explained | Hash-Based Message Authentication Code in Network Security
17-How Public Key Distribution Works? | Secure Key Sharing in Network Security
18-DSA Algorithm Explained | How Digital Signatures Work in Network Security | Understanding DSA
19-Learn Kerberos in Network Security | How Kerberos Works? | Authentication Protocol Made Simple
20-What is X.509? | Digital Certificates & Authentication in Network Security | Part 1
21-What is X.509? | Digital Certificates & Authentication in Network Security | Part 2
22-PGP(Pretty Good Privacy) Explained | E-mail Security | Secure Email Using Public Key Cryptography
23-IP Security (IPSec) Part 1 | Authentication Header Explained | Network Security
24-IP Security (IPSec) Part 2 | Encapsulating Security Payload (ESP) Explained
25-Secure Socket Layer (SSL) Part 1 | SSL Record Protocol Explained | Network Security
27-Secure Socket Layer (SSL) Part 2 | Handshake & Alert Protocols | Cryptography & Network Security
28-Secure Electronic Transaction (SET) – Part 1 | Network Security & E-Commerce Protocol
29-Secure Electronic Transaction (SET) – Part 2 | Detailed Working of SET Protocol
Learn Cryptography and Network Security in 12 Hours || Information Security || CNS || IS

Taught by

Sundeep Saradhi Kanthety

Reviews

Start your review of Cryptography and Network Security - Complete Course

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.