Week 1
Day 1 : Introduction to Information Security
Day 2 : Protection Vs Security
Day 3 : Aspects of security
Week 2
Day 1 : Security problems
Day 2 : User authentication
Day 3 : Orange Book
Week 3
Day 1 : Security threats
Day 2 : Program threats
Day 3 : Worms and viruses
Week 4
Day 1 : Trojan horse and Trap door
Day 2 : Stack and buffer overflow
Day 3 : System threats
Week 5
Day 1 : Communication threats
Day 2 : Introduction to Cryptography
Day 3 : Substitution techniques-I
Week 6
Day 1 : Substitution techniques-II
Day 2 : Transposition ciphers
Day 3 : Overview of symmetric key algorithms
Week 7
Day 1 : Data Encryption standard
Day 2 : Advanced Encryption standards
Day 3 : The AES Cipher
Week 8
Day 1 : Public Key encryption
Day 2 : RSA algorithm
Day 3 : The security of RSA
Week 9
Day 1 : Diffie-Hellman key exchange
Day 2 : ECC Cryptography
Day 3 : Message authentication
Week 10
Day 1 : Cryptographic hash functions
Day 2 : Digital signature
Day 3 : Symmetric key and Public key signature
Week 11
Day 1 : Message digests
Day 2 : Public key infrastructure
Day 3 : Security mechanisms-An overview
Week 12
Day 1 : Auditing and logging
Day 2 : Trip wire
Day 3 : System call monitoring
DOWNLOAD APP
FOLLOW US