The state of the art in cyber security, Vulnerabilities and Attacks, Defense Mechanisms, Guiding Principles of sound security practice.
Cryptography - symmetric versus asymmetric key encryption. Case studies - DES, RSA.
The cryptographic hash and its uses. Digital signatures, digital certificates and the Public Key Infrastructure. The discrete logarithm and its applications.
Basic authentication protocols. Needham-Schroeder and Kerberos protocols. Transport Layer Security (TLS/SSL).
Protocol vulnerabilities, ARP spoofing, Denial of service (DoS/DDoS) and pharming attacks.Application vulnerabilities, Buffer overflow, cross-site scripting and SQL injection attacks.
Malware case studies.Intrusion detection/prevention strategies.Different types and levels of Access Control, Firewalls.
The course deals with the underlying principles of cryptography and network security. It develops the mathematical tools required to understand the topic of cryptography.
Ask a Question
e-book enables you to access interactive reading material to strengthen the skills learned in the sessions.
Online Lab enables you to practice the application of concepts you have learnt in the sessions in the virtual environment.
Tutorials enables you to get easy learning with clear, crisp, and to-the-point content on a wide range of technical and non-technical subjects without any preconditions and impediments.