Udemy - Computer Network Security Protocols And Techniques (Updated 02.2021)

Category: Tutorial


Posted on 2021-10-24, by voska89.

Description



42e269f286dea63817951ca5540edd1d.jpeg
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 56 lectures (3h 33m) | Size: 964.6 MB
Public-Private Key Cryptography, Hash Functions, End Point Authentication, TLS/SSL, IPsec in VPNs, Integrity Protection


What you'll learn:
Computer Network security Alogorithms
Symmetric And Asymmetric Key Cryptography
Traditional And Modern Ciphers
Message Authentication/Integrity Protection
Hash Functions
RSA And diffie hellman Key Exchange Algorithms
End Point Authentication
E-mail security Protocol
Transport Layer Security (TLS)
Secure Socket Layer (SSL)
IPsec for virtual private networks
Requirements
Familiarity With Basic Computer Network Concepts
Description
The aim of this course is to introduce the student to the area of computer Network Security. This course develops a basic understanding of the algorithms used to protect the flow of information in Computer networks and to understand some of the design choices behind these algorithms.
The content of this course are as follows:
Section 1: Introduction
What is Computer Network Security?
Friends And Enemies: Alice, Bob and Eve
Section 2: Principles Of Cryptography
The Terminologies Of Cryptography
Two Domains Of Cryptography-Symmetric Key Cryptography & Public Key Cryptography
Traditional Ciphers and its Types
Example Of Shift Cipher-Caesar Cipher
Example of Transposition Cipher
Section 3: The Modern Ciphers
DES and Triple DES
Advanced Encryption Standard (AES)
Modes of Operation for block cipher: ECB, CBC,CFB, OFB
Section 4: Asymmetric key cryptography
Rivest, Shamir, Adleman (RSA) Algorithm
Diffie-Hellman Key Exchange Algorithm
Man In The Middle Attack
Section 5: Message Authentication-Integrity Protection Using Digital Signatures
Hash Functions-MD5 and SHA-1
Role Of Certification Authorities in Public Key Encryption
Section 6: End Point Authentication Scenarios to avoid man in the middle attack
Section 7: Securing The E-mail
Pretty Good Privacy (PGP) to secure e-mail
Section 8: Transport Layer Security Using TLS/SSL
TLS Security Services (TLS) Services
The bigger picture-Toy TLS/SSL Example
Actual TLS-SSL Cipher Suite
Protocols used in actual TLS
Handshake in Actual TLS
Actual TLS Record Protocol
Actual TLS Flow Diagram
Section 9: Virtual Private Networks
IPsec Protocol in VPNs
IPsec Security Services
IPSec Framework
IPSec Security Association
Internet Key Exchange (IKE): IKE Phase 1, IKE Phase 2
Authentication Header (AH) Vs Encapsulating Security Payload (ESP)
Transport Versus Tunnel Mode
Authentication Header (AH) Protocol
Encapsulating Security Payload (ESP)
Four Modes Of IPsec
Who this course is for
Beginner, Intermediate and Network Engineers who want to learn about Security
Homepage
https://www.udemy.com/course/computer-network-security-protocols-cryptography-tls-ssl-ipsec-rsa/


f472b4843daac9b0069c54c4b030364c.png More Course Expensive Download Click Here : https://www.ebookee.com/user/voska89


https://hot4share.com/qgakzyr0qdw6/t3uli.C.N.S.P.A.T.U.022021.rar.html
uploadgig.png
https://uploadgig.com/file/download/F3eaC2604e57090d/t3uli.C.N.S.P.A.T.U.022021.rar
rapidgator.png
https://rapidgator.net/file/fec05094f19f8af222d80bfea739164d/t3uli.C.N.S.P.A.T.U.022021.rar.html

Links are Interchangeable - No Password - Single Extraction

Sponsored High Speed Downloads
5922 dl's @ 3114 KB/s
Download Now [Full Version]
9837 dl's @ 3451 KB/s
Download Link 1 - Fast Download
5107 dl's @ 2145 KB/s
Download Mirror - Direct Download



Search More...
Udemy - Computer Network Security Protocols And Techniques (Updated 02.2021)

Search free ebooks in ebookee.com!


Links
Download this book

No active download links here?
Please check the description for download links if any or do a search to find alternative books.


Related Books


Comments

No comments for "Udemy - Computer Network Security Protocols And Techniques (Updated 02.2021)".


    Add Your Comments
    1. Download links and password may be in the description section, read description carefully!
    2. Do a search to find mirrors if no download links or dead links.
    Back to Top