Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Get 35% Off CFI Certifications - Code CFI35
Overview
Syllabus
Introduction to Cryptography and Network Security
CIA Triad
The OSI Security Architecture
Security Attacks
Security Services
Security Mechanisms
Network Security Model
Cryptography
Cryptography – Key Terms
Cryptanalysis
Brute Force Attack
Classical Encryption Techniques
Caesar Cipher (Part 1)
Caesar Cipher (Part 2)
Monoalphabetic Cipher
Playfair Cipher (Part 1)
Playfair Cipher (Part 2)
Playfair Cipher (Solved Question)
Hill Cipher (Encryption)
Hill Cipher (Decryption)
Polyalphabetic Cipher (Vigenère Cipher)
Polyalphabetic Cipher (Vernam Cipher)
One Time Pad
Rail Fence Technique
Row Column Transposition Ciphering Technique
Steganography
LSB Steganography - Demo
Cryptography (Solved Questions)
Abstract Algebra and Number Theory
Prime Numbers in Cryptography
Modular Arithmetic (Part 1)
Modular Arithmetic (Part 2)
Modular Exponentiation (Part 1)
Modular Exponentiation (Part 2)
GCD - Euclidean Algorithm (Method 1)
GCD - Euclidean Algorithm (Method 2)
Relatively Prime (Co-Prime) Numbers
Euler’s Totient Function (Phi Function)
Euler’s Totient Function (Solved Examples)
Fermat's Little Theorem
Euler's Theorem
Primitive Roots
Multiplicative Inverse
Extended Euclidean Algorithm (Solved Example 1)
Extended Euclidean Algorithm (Solved Example 2)
Extended Euclidean Algorithm (Solved Example 3)
The Chinese Remainder Theorem (Solved Example 1)
The Chinese Remainder Theorem (Solved Example 2)
The Discrete Logarithm Problem
The Discrete Logarithm Problem (Solved Example)
Prime Factorization (Fermat's Factoring Method)
Testing for Primality (Fermat's Test)
Testing for Primality (Miller-Rabin Test)
Group and Abelian Group
Cyclic Group
Rings, Fields and Finite Fields
Stream Cipher vs. Block Cipher
Feistel Cipher Structure
Introduction to Data Encryption Standard (DES)
Single Round of DES Algorithm
The F Function of DES (Mangler Function)
Key Scheduling and Decryption in DES
Avalanche Effect and the Strength of DES
Data Encryption Standard (DES) - Solved Questions
Introduction to Advanced Encryption Standard (AES)
AES Encryption and Decryption
AES Round Transformation
AES Key Expansion
AES Security and Implementation Aspects
Multiple Encryption and Triple DES
Block Cipher Modes of Operation
Electronic Codebook (ECB)
Cipher Block Chaining (CBC)
Cipher Feedback (CFB)
Output Feedback (OFB)
Counter Mode (CTR)
Block Cipher Modes of Operation (Solved Question)
Pseudorandom Number Generator (PRNG)
Golomb’s Randomness Postulates
Public Key Cryptography | Chapter-4 | Cryptography & Network Security | nesoacademy.org
Hash Functions & Digital Signatures | Chapter-5 | Cryptography & Network Security | nesoacademy.org
System Practices & System Security | Chapter-6 | Cryptography & Network Security | nesoacademy.org
Web, Email, & IP Security | Chapter-7 | Cryptography & Network Security | nesoacademy.org
Taught by
Neso Academy
Reviews
5.0 rating, based on 1 Class Central review
-
I am very passionate about cyber security and networking. Found course here and I learn to much than my thoughts . It is very useful for clear my basic concepts. I feel very thankful