1. |
|
Introduction 1 |
Computer Security Concepts |
|
2. |
|
Introduction 2 |
OSI Security Architecture,
Security Attacks,
Security Services,
Security Mechanisms,
A Model for Network Security |
|
3. |
|
Symmetric Encryption & Message Confidentiality 1 |
Symmetric Encryption Principles |
|
|
|
Symmetric Encryption & Message Confidentiality 2 |
Symmetric Block Encryption Algorithms,
Random and Pseudorandom Numbers |
|
4. |
|
Symmetric Encryption & Message Confidentiality 3 |
Stream Ciphers and RC4,
Cipher Block Modes of Operation |
|
|
|
Symmetric Encryption & Message Confidentiality 4 |
Cipher Block Modes of Operation |
|
5. |
|
Public-Key Cryptogrphy and Message Authentication 1 |
Approaches to Message Authentication, |
|
|
|
Public-Key Cryptogrphy and Message Authentication 2 |
Secure Hash Functions |
|
6. |
|
Public-Key Cryptogrphy and Message Authentication 3 |
Message Authentication Codes : HMAC |
|
|
|
Public-Key Cryptogrphy and Message Authentication 4 |
Message Authentication Codes,
Public-Key Cryptography Principles |
|
7. |
|
Public-Key Cryptogrphy and Message Authentication 5 |
Public-Key Cryptography Algorithms |
|
|
|
Public-Key Cryptogrphy and Message Authentication 6 |
Public-Key Cryptography Algorithms,
Digital Signatures |
|
8. |
|
Key Distribution and User Authentication 1 |
Symmetric Key Distribution Using Symmetric Encryption |
|
|
|
Key Distribution and User Authentication 2 |
Kerberos |
|
9. |
|
Key Distribution and User Authentication 3 |
Kerberos,
Key Distribution Using Asymmetric Encryption,
X.509 Certificates, |
|
|
|
Key Distribution and User Authentication 4 |
X.509 Certificates |
|
10. |
|
Key Distribution and User Authentication 5 |
Public-Key Infrastructure,
Federated Identity Management |
|
11. |
|
Transport-Level Security 1 |
Web Security Considerations,
SSL and TLS |
|
|
|
Transport-Level Security 2 |
Secure Socket Layer (SSL), Transport Layer Security (TLS),
HTTPS |
|
|
|
Transport-Level Security 3 |
Secure Shell (SSH) |
|
12. |
|
Wireless Network Security 1 |
Wireless Security,
Wireless Network Threat |
|
|
|
Wireless Network Security 2 |
Mobile Device Security,
IEEE 802.11 Wireless LAN Overview |
|
|
|
Wireless Network Security 3 |
IEEE 802.11 Wireless LAN Overview |
|
13. |
|
Wireless Network Security 4 |
IEEE 802.11i Wireless LAN Security |
|
|
|
Wireless Network Security 5 |
IEEE 802.11i Wireless LAN Security |
|
14. |
|
Electronic Mail Security 1 |
Pretty good privacy,
PGP Operation(Authentication, Confidentiality) |
|
|
|
Electronic Mail Security 2 |
PGP Operation(Compression, E-mail Compatibility),
S/MIME |
|
|
|
Electronic Mail Security 3 |
S/MIME,
DomainKeys Identified Mail |
|
15. |
|
IP Security 1 |
IP Security Overview |
|
|
|
IP Security 2 |
IP Security Policy,
Encapsulating Security Payload |
|
|
|
IP Security 3 |
Combining Security Associations,
Internet Key Exchange,
Cryptographic Suites |
|