Video Lectures

32x32

Chapter 1 : Introduction
Topic : introduction to information and network security
Content : Security Trends, Security Attacks, Security mechanisms, security Services 73 MB ,51:12 MIN , THEORY


32x32

Chapter 2 : Cryptography
Topic : cryptography
Content : symmetric key cipher model, public key encryption 35 MB ,22:45 MIN , THEORY


32x32

Chapter 2 : symmetric key techniques
Topic : Symmetric Key techniques
Content : substitution techniques, transposition techniques 81 MB ,54:3 MIN , THEORY


32x32

Chapter 2 : symmetric key techniques
Topic : Symmetric Key techniques
Content : block ciphers 40 MB ,26:44 MIN , THEORY


32x32

Chapter 4 : Des and AES
Topic : Des and AES algorithm
Content : Des, Aes 150 MB ,1:38:2 MIN , THEORY


32x32

Chapter 4 : Rsa algorithm and Key management
Topic : Rsa algorithm and Key management
Content : Asymmetric key cryptography, RSA algorithm, Key management, Diffie Hellman Key Exchange Algorithm, Man in the middle attack 93 MB ,38:31 MIN , THEORY


32x32

Chapter 1 : message authentication
Topic : message authenticatioin
Content : authentication requirements, authentication functions, mac, hash functions, security of hash functions 38 MB ,36:39 MIN , THEORY


32x32

Chapter 2 : Hashing Functions
Topic : Hashing Algorithms
Content : SHA-1, SHA-512, HMAC 55 MB ,57:31 MIN , THEORY


32x32

Chapter 3 : Digital Signature and Authentication protocol
Topic : digital Signature and Authentication protocol
Content : Digital Signature, DSS, DSA, Digital Certificate, Authentication Protocol, X.509 Certificate, PKI, Kerberos 77 MB ,1:5:35 MIN , THEORY


32x32

Chapter 1 : Email Security
Topic : Electronic Mail Security
Content : PEM, PGP and S/MIME 28 MB ,28:9 MIN , THEORY


32x32

Chapter 2 : IP Security
Topic : IP Security
Content : Uses of IPSec, Transport Mode, Tunnel Mode, Authentication protocol, Encapsulating Security protocol, Security Associations, Key management, IPSec Architecture 72 MB ,1:6:9 MIN , THEORY


32x32

Chapter 3 : Web Security
Topic : Web Security
Content : Web Security Considerations, SSL, TLS, SHTTP, SET 73 MB ,1:5:55 MIN , THEORY


32x32

Chapter 4 : intrusions
Topic : Intrusions
Content : Intrusions, intruders, Intruders techniques, Intrusion detection , Honeypots 54 MB ,50:7 MIN , THEORY


32x32

Chapter 5 : Malicious Software
Topic : Malicious Software
Content : Virus, types of virus, Virus countermeasures, DDoS attack 70 MB ,1:4:49 MIN , THEORY


32x32

Chapter 5 : Firewall
Topic : Firewall
Content : Firewall, Design principles, Types, Configurations, NAT, DMZ, VPN, limitations 97 MB ,1:31:15 MIN , THEORY


The Shikshak App

The Shikshak App is an honest attempt to provide quality education.

https://play.google.com/store/apps/details?id=com.weit.theshikshak&hl=en_IN