Computer Network Security Protocols And Techniques | Udemy


Computer Network Security Protocols And Techniques | Udemy
English | Size: 1.11 GB
Genre: eLearning

What you’ll learn
Computer Network security Alogorithms
Symmetric And Asymmetric Key Cryptography
Traditional And Modern Ciphers
Message Authentication/Integrity Protection
Hash Functions
RSA And diffie hellman Key Exchange Algorithms
End Point Authentication
E-mail security Protocol
Transport Layer Security (TLS)
Secure Socket Layer (SSL)
IPsec for virtual private networks

The aim of this course is to introduce the student to the area of computer Network Security. This course develops a basic understanding of the algorithms used to protect the flow of information in Computer networks and to understand some of the design choices behind these algorithms.

The content of this course are as follows:

Section 1: Introduction

What is Computer Network Security?

Friends And Enemies: Alice, Bob and Eve

Section 2: Principles Of Cryptography

The Terminologies Of Cryptography

Two Domains Of Cryptography-Symmetric Key Cryptography & Public Key Cryptography

Traditional Ciphers and its Types

Example Of Shift Cipher-Caesar Cipher

Example of Transposition Cipher

Section 3: The Modern Ciphers

DES and Triple DES

Advanced Encryption Standard (AES)

Modes of Operation for block cipher: ECB, CBC,CFB, OFB

Section 4: Asymmetric key cryptography

Rivest, Shamir, Adleman (RSA) Algorithm

Diffie-Hellman Key Exchange Algorithm

Man In The Middle Attack

Section 5: Message Authentication-Integrity Protection Using Digital Signatures

Hash Functions-MD5 and SHA-1

Role Of Certification Authorities in Public Key Encryption

Section 6: End Point Authentication Scenarios to avoid man in the middle attack

Section 7: Securing The E-mail

Pretty Good Privacy (PGP) to secure e-mail

Section 8: Transport Layer Security Using TLS/SSL

TLS Security Services (TLS) Services

The bigger picture-Toy TLS/SSL Example

Actual TLS-SSL Cipher Suite

Protocols used in actual TLS

Handshake in Actual TLS

Actual TLS Record Protocol

Actual TLS Flow Diagram

Section 9: Virtual Private Networks

IPsec Protocol in VPNs

IPsec Security Services

IPSec Framework

IPSec Security Association

Internet Key Exchange (IKE): IKE Phase 1, IKE Phase 2

Authentication Header (AH) Vs Encapsulating Security Payload (ESP)

Transport Versus Tunnel Mode

Authentication Header (AH) Protocol

Encapsulating Security Payload (ESP)

Four Modes Of IPsec

Who this course is for:
Beginner, Intermediate and Network Engineers who want to learn about Security

nitro.download/view/92BBC4F07D711BB/ComputerNetworkSecurityProtocolsAndTechniquesUpdated02-2021.fc.part1.rar
nitro.download/view/C1DEB6E6EF4C397/ComputerNetworkSecurityProtocolsAndTechniquesUpdated02-2021.fc.part2.rar
nitro.download/view/66B07FBDC98057D/ComputerNetworkSecurityProtocolsAndTechniquesUpdated02-2021.fc.part3.rar

rapidgator.net/file/5b3e8214f6e7e4e1cd07b01aa7ecb317/ComputerNetworkSecurityProtocolsAndTechniquesUpdated02-2021.fc.part1.rar.html
rapidgator.net/file/0f811dbf25a92a5129d8f097c956cc59/ComputerNetworkSecurityProtocolsAndTechniquesUpdated02-2021.fc.part2.rar.html
rapidgator.net/file/3dd64b385675968f60a39637a63cf36e/ComputerNetworkSecurityProtocolsAndTechniquesUpdated02-2021.fc.part3.rar.html

If any links die or problem unrar, send request to
goo.gl/t4uR9G

About WoW Team

I'm WoW Team , I love to share all the video tutorials. If you have a video tutorial, please send me, I'll post on my website. Because knowledge is not limited to, irrespective of qualifications, people join hands to help me.

Speak Your Mind

This site uses Akismet to reduce spam. Learn how your comment data is processed.