Overview
Syllabus
01-Network Security Basics Explained | Information Security, Encryption & Decryption for Beginners
02-Types of Attacks in Network Security | Active vs Passive Attacks | Cryptography &Network Security
03-Security Services in Network Security | Authentication, Confidentiality & InfoSec Explained
04-Understanding Cryptographic Algorithms | Network Security & InfoSec Concepts
05-Substitution Techniques in Network Security | Caesar Cipher & Playfair Cipher Explained
06-Transposition Techniques in Network Security | Rail Fence & Row Transposition Cipher Explained
07-Network Security: Block Cipher Modes | ECB, CBC, CFB, OFB & CTR Explained
08-Feistel Structure in Network Security | Encryption Model Explained with Example
09-DES Algorithm in Network Security | Step-by-Step Explanation with Example
10-AES in Network Security | Advanced Encryption Standard | Step-by-Step Working of AES Algorithm
11-Learn RSA Algorithm Step-by-Step | Public Key Encryption in Network Security
12-Diffie-Hellman Key Exchange | Step-by-Step Guide | Secure Key Exchange Made Simple
13-Message Authentication in Cryptography | MAC vs Hash Functions vs Encryption
14-MD5 Algorithm Explained | Step-by-Step Explanation | Message Digest Algorithm
15-SHA-512 Algorithm Explained | Secure Hash Algorithm | Network Security Made Simple
16-HMAC Algorithm Explained | Hash-Based Message Authentication Code in Network Security
17-How Public Key Distribution Works? | Secure Key Sharing in Network Security
18-DSA Algorithm Explained | How Digital Signatures Work in Network Security | Understanding DSA
19-Learn Kerberos in Network Security | How Kerberos Works? | Authentication Protocol Made Simple
20-What is X.509? | Digital Certificates & Authentication in Network Security | Part 1
21-What is X.509? | Digital Certificates & Authentication in Network Security | Part 2
22-PGP(Pretty Good Privacy) Explained | E-mail Security | Secure Email Using Public Key Cryptography
23-IP Security (IPSec) Part 1 | Authentication Header Explained | Network Security
24-IP Security (IPSec) Part 2 | Encapsulating Security Payload (ESP) Explained
25-Secure Socket Layer (SSL) Part 1 | SSL Record Protocol Explained | Network Security
27-Secure Socket Layer (SSL) Part 2 | Handshake & Alert Protocols | Cryptography & Network Security
28-Secure Electronic Transaction (SET) – Part 1 | Network Security & E-Commerce Protocol
29-Secure Electronic Transaction (SET) – Part 2 | Detailed Working of SET Protocol
Learn Cryptography and Network Security in 12 Hours || Information Security || CNS || IS
Taught by
Sundeep Saradhi Kanthety