1. |
|
Introduction 1
|
Computer Security Concepts |
|
2. |
|
Introduction 2
|
OSI Security Architecture,
Security Attacks,
Security Services,
Security Mechanisms,
A Model for Network Security |
|
3. |
|
Symmetric Encryption & Message Confidentiality 1
|
Symmetric Encryption Principles |
|
|
|
Symmetric Encryption & Message Confidentiality 2
|
Symmetric Block Encryption Algorithms,
Random and Pseudorandom Numbers |
|
4. |
|
Symmetric Encryption & Message Confidentiality 3
|
Stream Ciphers and RC4,
Cipher Block Modes of Operation |
|
|
|
Symmetric Encryption & Message Confidentiality 4
|
Cipher Block Modes of Operation |
|
5. |
|
Public-Key Cryptogrphy and Message Authentication 1
|
Approaches to Message Authentication, |
|
|
|
Public-Key Cryptogrphy and Message Authentication 2
|
Secure Hash Functions |
|
6. |
|
Public-Key Cryptogrphy and Message Authentication 3
|
Message Authentication Codes : HMAC |
|
|
|
Public-Key Cryptogrphy and Message Authentication 4
|
Message Authentication Codes,
Public-Key Cryptography Principles |
|
7. |
|
Public-Key Cryptogrphy and Message Authentication 5
|
Public-Key Cryptography Algorithms |
|
|
|
Public-Key Cryptogrphy and Message Authentication 6
|
Public-Key Cryptography Algorithms,
Digital Signatures |
|
8. |
|
Key Distribution and User Authentication 1
|
Symmetric Key Distribution Using Symmetric Encryption |
|
|
|
Key Distribution and User Authentication 2
|
Kerberos |
|
9. |
|
Key Distribution and User Authentication 3
|
Kerberos,
Key Distribution Using Asymmetric Encryption,
X.509 Certificates, |
|
|
|
Key Distribution and User Authentication 4
|
X.509 Certificates |
|
10. |
|
Key Distribution and User Authentication 5
|
Public-Key Infrastructure,
Federated Identity Management |
|
11. |
|
Transport-Level Security 1
|
Web Security Considerations,
SSL and TLS |
|
|
|
Transport-Level Security 2
|
Secure Socket Layer (SSL), Transport Layer Security (TLS),
HTTPS |
|
|
|
Transport-Level Security 3
|
Secure Shell (SSH) |
|
12. |
|
Wireless Network Security 1
|
Wireless Security,
Wireless Network Threat |
|
|
|
Wireless Network Security 2
|
Mobile Device Security,
IEEE 802.11 Wireless LAN Overview |
|
|
|
Wireless Network Security 3
|
IEEE 802.11 Wireless LAN Overview |
|
13. |
|
Wireless Network Security 4
|
IEEE 802.11i Wireless LAN Security |
|
|
|
Wireless Network Security 5
|
IEEE 802.11i Wireless LAN Security |
|
14. |
|
Electronic Mail Security 1
|
Pretty good privacy,
PGP Operation(Authentication, Confidentiality) |
|
|
|
Electronic Mail Security 2
|
PGP Operation(Compression, E-mail Compatibility),
S/MIME |
|
|
|
Electronic Mail Security 3
|
S/MIME,
DomainKeys Identified Mail |
|
15. |
|
IP Security 1
|
IP Security Overview |
|
|
|
IP Security 2
|
IP Security Policy,
Encapsulating Security Payload |
|
|
|
IP Security 3
|
Combining Security Associations,
Internet Key Exchange,
Cryptographic Suites |
|