Save on skills. Reach your goals from $11.99

Cryptography and System Security

Last updated on August 19, 2025 9:17 pm
Category:

Description

Wat je leert

  • Security Goals, Security Attacks, Security Services and Mechanism
  • Cryptography and its types, Classical Encrption Techniques
  • Substitution techniques: Caesar Cipher, Affine Cipher, Vigenere cipher, Playfair cipher
  • Transposition techniques: Keyed and Keyless transposition ciphers
  • Diffie Hellman Key Exchange Algorithm
  • Man in the Middle Attack Example
  • Key Distribution Center (KDC)
  • Public Key Cryptosystem: RSA Algorithm and its examples
  • TCP-IP Vulnerabilites
  • Internet Security Protocols: SSL, TLS, IPSec
  • Firewall and its types: Packet Filter, Circuit Level, Application Level, Stateful Multilayer Firewall
  • Intrusion Detection System: HIDS, NIDS, Hybrid IDS, Signature based IDS, Anomaly Based IDS
  • Hash Functions and Properties of Hash Function
  • Message Authentication Code (MAC), Nested MAC, CMAC and HMAC
  • Digital Certificate and X.509

Meer tonenMinder tonen

In this course you will learn about cryptography and system security concepts.

This course provides an in-depth exploration of system security goals and concepts, focusing on confidentiality, integrity, availability, and related principles such as authentication and non-repudiation. It delves into classical and modern encryption techniques, including symmetric and asymmetric algorithms, and the application of these methods to solve problems related to data confidentiality and authentication. The course covers hashing algorithms for data integrity and the analysis of digital signature schemes to ensure secure communication. Students will also learn to design secure applications, analyze network vulnerabilities, and evaluate various attacks. The course includes an evaluation of firewalls and key security protocols such as SSL/TLS, IPSec, and PGP, preparing students to effectively implement and assess security measures in real-world scenarios.

Chapter 1 : Introduction and Basics of Cryptography

  • Security and its types

  • CIA Triads (Security Goals)

  • Security Threats (Threats related to Confidentiality, Integrity and Availability)

  • Security services and mechanism

Chapter 2 : Cryptography and Different Types of Ciphers with example

  • What is Cryptography and its terminology

  • Classical Encryption Techniques: Symmetric and Asymmetric Encryption Techniques

  • Cryptography and its categories

  • Different types of ciphers – Substitution Cipher

  • Caesar Cipher and Generalized Caesar Cipher

  • Caesar Cipher Example 2

  • Affine Cipher

  • Playfair Cipher

  • Playfair Cipher Example

  • Vigenere Cipher: Vigenere Table Method

  • Vigenere Cipher: Keyword Method

  • Transposition Cipher: Keyless Transposition Cipher

  • Transposition Cipher: Keyed Transposition Cipher

Chapter 3 : Public Key Cryptography

  • Key Distribution Center (KDC)

  • Diffie Hellman Key Exchange Algorithm

  • Diffie Hellman Example

  • RSA Algorithm – Steps

  • RSA Example 1

  • RSA Example 2

  • RSA Example 3

  • Man in the Middle Attack Example

Chapter 4 : Hash Function, MAC, CMAC and HMAC

  • What is hash function?

  • Properties of hash function

  • Message Authentication Code (MAC)

  • Nested MAC

  • CMAC

  • HMAC

Chapter 5 : Digital Certificate

  • Digital Certificate

  • X.509 Digital Certificate Format

Chapter 6 : Authentication

  • Authentication and Authorization

  • Multi-factor Authentication

Chapter 7 : TCP/IP Vulnerabilities

  • TCP/IP Vulnerabilities

  • Packet Sniffing

  • ARP spoofing

  • DNS Spoofing

  • Port Scanning

  • IP spoofing

  • TCP Syn Flood

Chapter 8 : Internet Security Protocols

  • Introduction

  • SSL

  • SSL Protocol Stack

  • TLS

  • IPSec

  • IPSec Modes of Operations: Transport and Tunnel Mode

  • IP Sec Protocols : AH and ESP

Chapter 9 : Firewall

  • What is Firewall and its types

  • Packet Filters Firewall

  • Circuit Level Gateway Firewall

  • Application Level Firewall

  • Stateful Multilayer Firewall

Chapter 10 :  Intrusion Detection System (IDS)

  • What is Intrusion and its types

  • IDS and its types

  • Host based IDS

  • Network based IDS

  • Hybrid IDS

  • Signature based IDS

  • Anomaly based IDS

Thanks for joining my course, let’s get started!

Voor wie is deze cursus bedoeld:

  • Engineering, Diploma , BSc, MSc

Meer tonenMinder tonen

Reviews

There are no reviews yet.

Be the first to review “Cryptography and System Security”

Your email address will not be published. Required fields are marked *