Premium Features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Powered by uCertify
  • Request Demo
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

Cryptography And Network Security

(CryptoSec.AB1.E1) / ISBN: 978-1-64459-188-8
This course includes
Lessons
TestPrep
LiveLab
Mentoring (Add-on)
CryptoSec.AB1.E1 : Cryptography And Network Security
Try this course Pre-Assessment and first two Lessons free No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

Cryptography And Network Security

Use the Cryptography and Network Security course and lab to learn about cryptography and cryptanalysis. The lab provides a hands-on learning experience in a safe and online environment. The online cryptography course and lab provide an understanding of the algorithms used to protect users online. It covers topics like identity-based encryption, attribute-based encryption, functional encryption, two-party/multi-party computation, bitcoin and crypto-currency, and post-quantum cryptography.
Here's what you will get

Lessons
  • 28+ Lessons
  • 130+ Quizzes
  • 201+ Flashcards
  • 201+ Glossary of terms
TestPrep
  • 60+ Pre Assessment Questions
  • 2+ Full Length Tests
  • 60+ Post Assessment Questions
  • 120+ Practice Test Questions
LiveLab
  • 33+ LiveLab
  • 32+ Video tutorials
  • 44+ Minutes
Here's what you will learn
Download Course Outline
Lesson 1: Information and Network Security Concepts
  • Cybersecurity, Information Security, and Network Security
  • The OSI Security Architecture
  • Security Attacks
  • Security Services
  • Security Mechanisms
  •  Cryptography
  • Network Security
  • Trust and Trustworthiness
  • Standards
Lesson 2: Introduction to Number Theory
  • Divisibility and The Division Algorithm
  • The Euclidean Algorithm
  • Modular Arithmetic
  • Prime Numbers4
  • Fermat’s and Euler’s Theorems
  • Testing for Primality
  • The Chinese Remainder Theorem
  • Discrete Logarithms
  • Appendix 2A: The Meaning of Mod
Lesson 3: Classical Encryption Techniques
  • Symmetric Cipher Model
  • Substitution Techniques
  • Transposition Techniques
Lesson 4: Block Ciphers and the Data Encryption Standard
  • Traditional Block Cipher Structure
  • The Data Encryption Standard
  • A DES Example
  • The Strength of DES
  • Block Cipher Design Principles
Lesson 5: Finite Fields
  • Groups
  • Rings
  • Fields
  • Finite Fields of the Form GF(p)
  • Polynomial Arithmetic
  • Finite Fields of the Form GF (2n)
Lesson 6: Advanced Encryption Standard
  • Finite Field Arithmetic
  • AES Structure
  • AES Transformation Functions
  • AES Key Expansion
  • An AES Example
  • AES Implementation
  • Appendix 6A: Polynomials with Coefficients in GF(28)
Lesson 7: Block Cipher Operation
  • Multiple Encryption and Triple DES
  • Electronic CodeBook
  • Cipher Block Chaining Mode
  • Cipher Feedback Mode
  • Output Feedback Mode
  • Counter Mode
  • XTS-AES Mode for Block-Oriented Storage Devices
  • Format-Preserving Encryption
Lesson 8: Random Bit Generation and Stream Ciphers
  • Principles of Pseudorandom Number Generation
  • Pseudorandom Number Generators
  • Pseudorandom Number Generation Using a Block Cipher
  • Stream Ciphers
  • RC4
  • Stream Ciphers Using Feedback Shift Registers
  • True Random Number Generators
Lesson 9: Public-Key Cryptography and RSA
  • Principles of Public-Key Cryptosystems
  • The RSA Algorithm
Lesson 10: Other Public-Key Cryptosystems
  • Diffie–Hellman Key Exchange
  • Elgamal Cryptographic System
  • Elliptic Curve Arithmetic
  • Elliptic Curve Cryptography
Lesson 11: Cryptographic Hash Functions
  • Applications of Cryptographic Hash Functions
  • Two Simple Hash Functions
  • Requirements and Security
  • Secure Hash Algorithm (SHA)
  • SHA-3
Lesson 12: Message Authentication Codes
  • Message Authentication Requirements
  • Message Authentication Functions
  • Requirements for Message Authentication Codes
  • Security of MACs
  • MACs Based on Hash Functions: HMAC
  • MACs Based on Block Ciphers: DAA and CMAC
  • Authenticated Encryption: CCM and GCM
  • Key Wrapping
  • Pseudorandom Number Generation Using Hash Functions and MACs
Lesson 13: Digital Signatures
  • Digital Signatures
  • Elgamal Digital Signature Scheme
  • Schnorr Digital Signature Scheme
  • Nist Digital Signature Algorithm
  • Elliptic Curve Digital Signature Algorithm
  • RSA-PSS Digital Signature Algorithm
Lesson 14: Lightweight Cryptography and Post-Quantum Cryptography
  • Lightweight Cryptography Concepts
  • Lightweight Cryptographic Algorithms
  • Post-Quantum Cryptography Concepts
  • Post-Quantum Cryptographic Algorithms
Lesson 15: Cryptographic Key Management and Distribution
  • Symmetric Key Distribution Using Symmetric Encryption
  • Symmetric Key Distribution Using Asymmetric Encryption
  • Distribution of Public Keys
  • X.509 Certificates
  • Public-Key Infrastructure
Lesson 16: User Authentication
  • Remote User-Authentication Principles
  • Remote User-Authentication Using Symmetric Encryption
  • Kerberos
  • Remote User-Authentication Using Asymmetric Encryption
  • Federated Identity Management
Lesson 17: Transport-Level Security
  • Web Security Considerations
  • Transport Layer Security
  • HTTPS
  • Secure Shell (SSH)
Lesson 18: Wireless Network Security
  • Wireless Security
  • Mobile Device Security
  • IEEE 802.11 Wireless LAN Overview
  • IEEE 802.11i Wireless LAN Security
Lesson 19: Electronic Mail Security
  • Internet Mail Architecture
  • Email Formats
  • Email Threats and Comprehensive Email Security
  • S/MIME
  • DNSSEC
  • DNS-Based Authentication of Named Entities
  • Sender Policy Framework
  • Domainkeys Identified Mail
  • Domain-Based Message Authentication, Reporting, and Conformance
Lesson 20: IP Security
  • IP Security Overview
  • IP Security Policy
  • Encapsulating Security Payload
  • Combining Security Associations
  • Internet Key Exchange
Lesson 21: Network Endpoint Security
  • Firewalls
  • Intrusion Detection Systems
  • Malicious Software
  • Distributed Denial of Service Attacks
Lesson 22: Cloud Security
  • Cloud Computing
  • Cloud Security Concepts
  • Cloud Security Risks and Countermeasures
  • Cloud Security as a Service
  • An Open-Source Cloud Security Module
Lesson 23: Internet of Things (IoT) Security
  • The Internet of Things
  • IoT Security Concepts and Objectives
  • An Open-Source IoT Security Module
Appendix A: Basic Concepts from Linear Algebra
  • A.1 Operations on Vectors and Matrices
  • A.2 Linear Algebra Operations Over Zn
Appendix B: Measures of Secrecy and Security
  • B.1 Conditional Probability
  • B.2 Perfect Secrecy
  • B.3 Information and Entropy
  • B.4 Entropy and Secrecy
  • B.5 Min-Entropy
Appendix C: Data Encryption Standard
Appendix D: Simplified AES
  • D.1 Overview
  • D.2 S-AES Encryption and Decryption
  • D.3 Key Expansion
  • D.4 The S-box
  • D.5 S-AES Structure
Appendix E: Mathematical Basis of the Birthday Attack
  • E.1 Related Problem
  • E.2 The Birthday Paradox
  • E.3 Useful Inequality
  • E.4 The General Case of Duplications
  • E.5 Overlap Between Two Sets

Virtual Lab

Information and Network Security Concepts

  • Obtaining Information about an IP Version
  • Getting Information about the DNS
  • Getting Information about the UDP Ports
  • Getting Information about the Current Connection Statistics of UDP
  • Getting the UDP Settings
  • Getting Information about the TCP Ports
  • Getting Information about the Current Connection Statistics of TCP
  • Getting the TCP Settings
  • Obtaining Information about the Net Firewall Profile
  • Obtaining IP Route Information from the IP Routing Table

Classical Encryption Techniques

  • Using OWASP ZAP
  • Performing Symmetric Encryption

Advanced Encryption Standard

  • Encrypting a File or Folder
  • Configuring File and Share Permissions
  • Using BitLocker in Windows 10
  • Configuring MDT
  • Creating a New Partition and Configuring BitLocker
  • Implementing AES Encryption

Public-Key Cryptography and RSA

  • Using OpenSSL to Create a Public/Private Key Pair
  • Using the RSA Asymmetric Algorithm

Cryptographic Hash Functions

  • Installing Windows Server Backup and Performing Backup of a Folder
  • Creating a Backup Schedule
  • Creating a Backup Once
  • Configuring RAID
  • Configuring RAID 5
  • Installing the Failover Cluster Feature
  • Using the Dependency Viewer

Cryptographic Key Management and Distribution

  • Using Steganography
  • Enabling a Keylogger in a Target Machine

IP Security

  • Adding Revision to the Revision History
  • Viewing and Downloading the Policy Templates
  • Opening the Policy Template and Setting the Company Name
  • Reviewing and Modifying the Policy Items
×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept