01
|
Introdution to Information Security, Security Goals, Stages of Attacks, Active vs Passive Attacks, Types of Security Attacks, Security Services, Security Mechanism
|
Download
|
02
|
Cryptography, Symmetric/Asymmetric, Traditional Ciphers, Confusion vs Diffusion, Stream Ciphers vs Block Ciphers, Components of Modern Block Ciphers (S-Box, P-Box), Feistal Structure, DES Algorithm, Triple DES, AES Algorithm, RSA Algorithm
|
Download
|
03
|
Modes of Operation (ECB, CBC, CFB, OFB)
|
Download
|
04
|
Public key Cryptography, Background Mathematics (Modulo Congruence, Eular Totient Function), RSA Algorithm
|
Download
|
05
|
Hash Functions, Features of Hash Functions, Properties of Hash Functions, Applications of Hash Functions,
|
Download
|
06
|
Digital Signatures and Digital Certificates
|
Download
|
07
|
Program Security, Goals of Program Security, Examples of Program Security Breaches, Overview of Secure Programming Practices
|
Download
|
08
|
Non-Malacious vs Malacious Codes - Virus
|
Download
|
09
|
Trap Doors, Salami attacks, covert channels and control against program
|
Download
|
10
|
Threat Protection in OS - Memory and Address Protection
|
Download
|
11
|
Access Control, Types, Authentication and Authorization, Access Control Models
|
Download
|
12
|
Database Security - Requirments, Confidentiality, Integrity, Reliability
|
Download
|
13
|
Practical Notes: use of Network tools: ping, ipconfig, ifconfig, tracert, arp, netstat, whois
|
Download
|
14
|
Database Security - sensitive data, Inference, Multilevel Security
|
Download
|
15
|
Security Controls, Intrusion Detection and Firewalls, Secuire e-mails
|
Download
|
16
|
Security Planning, Risk Analysis, Organisational Security Policy
|
Download
|
17
|
Ethical Issues in Security - Protecting Programs and data. Information and law
|
Download
|
|
|
|