Cryptography And Network Security
(CryptoSec.AB1.E1)
/ ISBN: 978-1-64459-188-8
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
Cryptography And Network Security
Use the Cryptography and Network Security course and lab to learn about cryptography and cryptanalysis. The lab provides a hands-on learning experience in a safe and online environment. The online cryptography course and lab provide an understanding of the algorithms used to protect users online. It covers topics like identity-based encryption, attribute-based encryption, functional encryption, two-party/multi-party computation, bitcoin and crypto-currency, and post-quantum cryptography.
Lessons
-
28+ Lessons
-
130+ Quizzes
-
201+ Flashcards
-
201+ Glossary of terms
TestPrep
-
60+ Pre Assessment Questions
-
2+ Full Length Tests
-
60+ Post Assessment Questions
-
120+ Practice Test Questions
LiveLab
-
33+ LiveLab
-
32+ Video tutorials
-
44+ Minutes
- Cybersecurity, Information Security, and Network Security
- The OSI Security Architecture
- Security Attacks
- Security Services
- Security Mechanisms
- Cryptography
- Network Security
- Trust and Trustworthiness
- Standards
- Divisibility and The Division Algorithm
- The Euclidean Algorithm
- Modular Arithmetic
- Prime Numbers4
- Fermat’s and Euler’s Theorems
- Testing for Primality
- The Chinese Remainder Theorem
- Discrete Logarithms
- Appendix 2A: The Meaning of Mod
- Symmetric Cipher Model
- Substitution Techniques
- Transposition Techniques
- Traditional Block Cipher Structure
- The Data Encryption Standard
- A DES Example
- The Strength of DES
- Block Cipher Design Principles
- Groups
- Rings
- Fields
- Finite Fields of the Form GF(p)
- Polynomial Arithmetic
- Finite Fields of the Form GF (2n)
- Finite Field Arithmetic
- AES Structure
- AES Transformation Functions
- AES Key Expansion
- An AES Example
- AES Implementation
- Appendix 6A: Polynomials with Coefficients in GF(28)
- Multiple Encryption and Triple DES
- Electronic CodeBook
- Cipher Block Chaining Mode
- Cipher Feedback Mode
- Output Feedback Mode
- Counter Mode
- XTS-AES Mode for Block-Oriented Storage Devices
- Format-Preserving Encryption
- Principles of Pseudorandom Number Generation
- Pseudorandom Number Generators
- Pseudorandom Number Generation Using a Block Cipher
- Stream Ciphers
- RC4
- Stream Ciphers Using Feedback Shift Registers
- True Random Number Generators
- Principles of Public-Key Cryptosystems
- The RSA Algorithm
- Diffie–Hellman Key Exchange
- Elgamal Cryptographic System
- Elliptic Curve Arithmetic
- Elliptic Curve Cryptography
- Applications of Cryptographic Hash Functions
- Two Simple Hash Functions
- Requirements and Security
- Secure Hash Algorithm (SHA)
- SHA-3
- Message Authentication Requirements
- Message Authentication Functions
- Requirements for Message Authentication Codes
- Security of MACs
- MACs Based on Hash Functions: HMAC
- MACs Based on Block Ciphers: DAA and CMAC
- Authenticated Encryption: CCM and GCM
- Key Wrapping
- Pseudorandom Number Generation Using Hash Functions and MACs
- Digital Signatures
- Elgamal Digital Signature Scheme
- Schnorr Digital Signature Scheme
- Nist Digital Signature Algorithm
- Elliptic Curve Digital Signature Algorithm
- RSA-PSS Digital Signature Algorithm
- Lightweight Cryptography Concepts
- Lightweight Cryptographic Algorithms
- Post-Quantum Cryptography Concepts
- Post-Quantum Cryptographic Algorithms
- Symmetric Key Distribution Using Symmetric Encryption
- Symmetric Key Distribution Using Asymmetric Encryption
- Distribution of Public Keys
- X.509 Certificates
- Public-Key Infrastructure
- Remote User-Authentication Principles
- Remote User-Authentication Using Symmetric Encryption
- Kerberos
- Remote User-Authentication Using Asymmetric Encryption
- Federated Identity Management
- Web Security Considerations
- Transport Layer Security
- HTTPS
- Secure Shell (SSH)
- Wireless Security
- Mobile Device Security
- IEEE 802.11 Wireless LAN Overview
- IEEE 802.11i Wireless LAN Security
- Internet Mail Architecture
- Email Formats
- Email Threats and Comprehensive Email Security
- S/MIME
- DNSSEC
- DNS-Based Authentication of Named Entities
- Sender Policy Framework
- Domainkeys Identified Mail
- Domain-Based Message Authentication, Reporting, and Conformance
- IP Security Overview
- IP Security Policy
- Encapsulating Security Payload
- Combining Security Associations
- Internet Key Exchange
- Firewalls
- Intrusion Detection Systems
- Malicious Software
- Distributed Denial of Service Attacks
- Cloud Computing
- Cloud Security Concepts
- Cloud Security Risks and Countermeasures
- Cloud Security as a Service
- An Open-Source Cloud Security Module
- The Internet of Things
- IoT Security Concepts and Objectives
- An Open-Source IoT Security Module
- A.1 Operations on Vectors and Matrices
- A.2 Linear Algebra Operations Over Zn
- B.1 Conditional Probability
- B.2 Perfect Secrecy
- B.3 Information and Entropy
- B.4 Entropy and Secrecy
- B.5 Min-Entropy
- D.1 Overview
- D.2 S-AES Encryption and Decryption
- D.3 Key Expansion
- D.4 The S-box
- D.5 S-AES Structure
- E.1 Related Problem
- E.2 The Birthday Paradox
- E.3 Useful Inequality
- E.4 The General Case of Duplications
- E.5 Overlap Between Two Sets
Virtual Lab
- Obtaining Information about an IP Version
- Getting Information about the DNS
- Getting Information about the UDP Ports
- Getting Information about the Current Connection Statistics of UDP
- Getting the UDP Settings
- Getting Information about the TCP Ports
- Getting Information about the Current Connection Statistics of TCP
- Getting the TCP Settings
- Obtaining Information about the Net Firewall Profile
- Obtaining IP Route Information from the IP Routing Table
- Using OWASP ZAP
- Performing Symmetric Encryption
- Encrypting a File or Folder
- Configuring File and Share Permissions
- Using BitLocker in Windows 10
- Configuring MDT
- Creating a New Partition and Configuring BitLocker
- Implementing AES Encryption
- Using OpenSSL to Create a Public/Private Key Pair
- Using the RSA Asymmetric Algorithm
- Installing Windows Server Backup and Performing Backup of a Folder
- Creating a Backup Schedule
- Creating a Backup Once
- Configuring RAID
- Configuring RAID 5
- Installing the Failover Cluster Feature
- Using the Dependency Viewer
- Using Steganography
- Enabling a Keylogger in a Target Machine
- Adding Revision to the Revision History
- Viewing and Downloading the Policy Templates
- Opening the Policy Template and Setting the Company Name
- Reviewing and Modifying the Policy Items
×