Chapter 1 : Introduction
Topic : introduction to information and network security
Content : Security Trends, Security Attacks, Security mechanisms, security Services
73 MB ,51:12 MIN , THEORY
Chapter 2 : Cryptography
Topic : cryptography
Content : symmetric key cipher model, public key encryption
35 MB ,22:45 MIN , THEORY
Chapter 2 : symmetric key techniques
Topic : Symmetric Key techniques
Content : substitution techniques, transposition techniques
81 MB ,54:3 MIN , THEORY
Chapter 2 : symmetric key techniques
Topic : Symmetric Key techniques
Content : block ciphers
40 MB ,26:44 MIN , THEORY
Chapter 4 : Des and AES
Topic : Des and AES algorithm
Content : Des, Aes
150 MB ,1:38:2 MIN , THEORY
Chapter 4 : Rsa algorithm and Key management
Topic : Rsa algorithm and Key management
Content : Asymmetric key cryptography, RSA algorithm, Key management, Diffie Hellman Key Exchange Algorithm, Man in the middle attack
93 MB ,38:31 MIN , THEORY
Chapter 1 : message authentication
Topic : message authenticatioin
Content : authentication requirements, authentication functions, mac, hash functions, security of hash functions
38 MB ,36:39 MIN , THEORY
Chapter 2 : Hashing Functions
Topic : Hashing Algorithms
Content : SHA-1, SHA-512, HMAC
55 MB ,57:31 MIN , THEORY
Chapter 3 : Digital Signature and Authentication protocol
Topic : digital Signature and Authentication protocol
Content : Digital Signature, DSS, DSA, Digital Certificate, Authentication Protocol, X.509 Certificate, PKI, Kerberos
77 MB ,1:5:35 MIN , THEORY
Chapter 1 : Email Security
Topic : Electronic Mail Security
Content : PEM, PGP and S/MIME
28 MB ,28:9 MIN , THEORY
Chapter 2 : IP Security
Topic : IP Security
Content : Uses of IPSec, Transport Mode, Tunnel Mode, Authentication protocol, Encapsulating Security protocol, Security Associations, Key management, IPSec Architecture
72 MB ,1:6:9 MIN , THEORY
Chapter 3 : Web Security
Topic : Web Security
Content : Web Security Considerations, SSL, TLS, SHTTP, SET
73 MB ,1:5:55 MIN , THEORY
Chapter 4 : intrusions
Topic : Intrusions
Content : Intrusions, intruders, Intruders techniques, Intrusion detection , Honeypots
54 MB ,50:7 MIN , THEORY
Chapter 5 : Malicious Software
Topic : Malicious Software
Content : Virus, types of virus, Virus countermeasures, DDoS attack
70 MB ,1:4:49 MIN , THEORY
Chapter 5 : Firewall
Topic : Firewall
Content : Firewall, Design principles, Types, Configurations, NAT, DMZ, VPN, limitations
97 MB ,1:31:15 MIN , THEORY