-> Cryptography and Network Security - Introduction

-> The OSI Security Architecture

-> Classical CryptoSystems

-> Classical Encryption Techniques

-> Linear Feedback Shift Register (LFSR)

-> Introduction to Number Theory

-> Finite Fields

-> Simplified Data Encryption Standard (S-DES)

-> Block Cipher Principles

-> Multiple Encryption & DES

-> Modes of Operation

-> Stream Ciphers

-> RC4

-> Principles of Public Key Cryptography

-> RSA Algorithm

-> Diffie-Hellman Key Exchange

-> Elliptic Curve Cryptography

-> Hash Functions

-> Simple Hash Functions

-> Birthday Attacks

-> Security of Hash Functions and Macs

-> Secure Hash Algorithm

-> Digital Signatures

-> Direct Digital Signatures

-> Digital Signature Algorithm(DSA)

-> Authentication Applications

-> Kerbero V4 Authentication Dialogue Message Exchange

-> X.509 Certificates

-> Authentication Procedures

-> Electronic Mail Security

-> Public-Key Management

-> S/MIME

-> S/MIME Functionality and Messages

-> Intruders

-> Intrusion Detection

-> Password Management

-> Firewalls: design principles, characteristics, Limitations, Types

-> Firewall configurations

-> Trusted systems

-> Viruses And Related Threats

-> Types of Network Viruses

-> Network Virus Countermeasures

-> Concepts and Definition of Computer Security

-> The Challenges of Computer Security

-> The OSI Security Architecture

-> Security Attacks: Passive and Active Attacks

-> Security Services

-> Security Mechanisms

-> A Model For Network Security

-> Classical Encryption Techniques

-> Symmetric Cipher Model

-> Substitution Techniques

-> Transposition Techniques

-> Rotor Machines

-> Steganography

-> Block Ciphers and the Data Encryption Standard

-> Block Cipher Principles

-> The Data Encryption Standard

-> A DES(Data Encryption Standard) Example

-> The Strength of DES(Data Encryption Standard)

-> Differential and Linear Cryptanalysis

-> Block Cipher Design Principles

-> Basic Concepts in Number Theory and Finite Fields

-> Divisibility and the Division Algorithm

-> The Euclidean Algorithm

-> Modular Arithmetic

-> Groups, Rings, and Fields

-> Finite Fields Of The Form GF(p)

-> Polynomial Arithmetic

-> Finite Fields of the Form GF(2n)

-> Advanced Encryption Standard(AES)

-> Finite Field Arithmetic

-> AES(Advanced Encryption Standard) Structure

-> Advanced Encryption Standard(AES) Transformation Functions

-> AES Key Expansion

-> An Advanced Encryption Standard(AES) Example

-> AES(Advanced Encryption Standard) Implementation

-> Block Cipher Operation

-> Multiple Encryption and Triple DES(Data Encryption Standard)

-> Electronic Code Book

-> Cipher Block Chaining(CBC) Mode

-> Cipher Feedback Mode

-> Output Feedback Mode

-> Counter Mode

-> XTS-AES Mode For Block-Oriented Storage Devices

-> Pseudorandom Number Generation and Stream Ciphers

-> Principles of Pseudorandom Number Generation

-> Pseudorandom Number Generators

-> Pseudorandom Number Generation Using a Block Cipher

-> Stream Ciphers

-> RC4

-> True Random Number Generators

-> Introduction to Number Theory

-> Prime Numbers

-> Fermat’s And Euler’s Theorems

-> Testing for Primality

-> The Chinese Remainder Theorem

-> Discrete Logarithms

-> Public-Key Cryptography and RSA

-> Principles of Public-Key Cryptosystems and its Applications, Requirements, Cryptanalysis

-> The RSA Algorithm

-> Description of the RSA Algorithm

-> The Security of RSA

-> Other Public-Key Cryptosystems

-> Diffie-Hellman Key Exchange

-> Elgamal Cryptographic System

-> Elliptic Curve Arithmetic

-> Elliptic Curve Cryptography

-> Pseudorandom Number Generation Based on an Asymmetric Cipher

-> Cryptographic Hash Functions

-> Applications of Cryptographic Hash Functions

-> Two Simple Hash Functions

-> Requirements and Security

-> Hash Functions Based on Cipher Block Chaining

-> Secure Hash Algorithm (SHA)

-> SHA-3

-> Message Authentication Codes

-> Message Authentication Requirements

-> Message Authentication Functions

-> Requirements For Message Authentication Codes

-> Security of MACS

-> MACS Based on Hash Functions: HMAC

-> MACS Based on Block Ciphers: DAA And CMAC

-> Authenticated Encryption: CCM and GCM

-> Pseudorandom Number Generation Using Hash Functions and MACS

-> Digital Signatures

-> Digital Signatures: Properties, Attacks and Forgeries

-> ELGAMAL Digital Signature Scheme

-> Schnorr Digital Signature Scheme

-> Digital Signature Standard

-> Key Management and Distribution

-> Symmetric Key Distribution Using Symmetric Encryption

-> Symmetric Key Distribution Using Asymmetric Encryption

-> Distribution of Public Keys

-> X.509 Certificates

-> Public-Key Infrastructure

-> User Authentication

-> Remote User-Authentication Principles

-> Remote User-Authentication Using Symmetric Encryption

-> Kerberos

-> Remote User Authentication Using Asymmetric Encryption

-> Federated Identity Management

-> Transport-Level Security

-> Web Security Considerations

-> Secure Socket Layer and Transport Layer Security

-> Transport Layer Security

-> HTTPS

-> Secure Shell (SSH)

-> Wireless Network Security

-> IEEE 802.11 Wireless LAN Overview: Wi-Fi Alliance, Protocol Architecture, Network Components

-> IEEE 802.11i Wireless LAN Security

-> Wireless Application Protocol Overview

-> Wireless Transport Layer Security

-> WAP End-to-End Security

-> Electronic Mail Security

-> Pretty Good Privacy

-> S/MIME

-> DomainKeys Identified Mail

-> IP Security(IPsec)

-> IP Security Overview

-> IP Security Policy

-> Encapsulating Security Payload

-> Combining Security Associations

-> Internet Key Exchange

-> Cryptographic Suites

-> Intruders

-> Intruders: Behavior Patterns and Techniques

-> Intrusion Detection

-> Password Management

-> Malicious Software

-> Types of Malicious Software

-> Computer Viruses: Nature, Classification, Virus Kits

-> Computer Virus Countermeasures

-> Computer or Network Worms

-> Distributed Denial of Service Attacks

-> Firewalls

-> The Need for Firewalls

-> Firewall Characteristics and limitations

-> Types of Firewalls

-> Firewall Basing

-> Firewall Location and Configurations

-> Legal And Ethical Aspects

-> Cybercrime and Computer Crime

-> Types of Computer Crime

-> Intellectual Property

-> Network and Computer Privacy

-> Ethical Issues - Network or Computer

Recent New Topics :