IT Course in Nepal -BICT Blog || Complete Guide for IT Students

 1.            Introduction

    1.1          Computer Security Concept

    1.2          The OSI Security Architecture

    1.3          Security Attacks

    1.4          Security Services

    1.5          Security Mechanism

    1.6          A Model for Network Security

    1.7          Classical cryptography

2.            Symmetric Encryption and message Confidentiality

    2.1          Symmetric Encryption Principles

    2.2          Symmetric Block Encryption Algorithms

    2.3          Cipher Block Modes of Operations

3.            Public-Key Cryptography and Message Digest

    3.1          Secure Hash functions

    3.2          Message Digest(MD)

    3.3          Public-Key Cryptography Principles

    3.4          Public-Key Cryptography Algorithms

    3.5          Digital Signatures

4.            Network Security Applications

    4.1          Public-Key Infrastructure

    4.2          Transport Layer Security: SSL, HTTPs, Secure Shell(SSH)

    4.3          Wireless Security: WEP, WAP, WPA2

    4.4          E-Mail Security: PGP, S/MIME

    4.5          IP Security

5.            System Security

    5.1          Intruders

    5.2          Malicious Software

    5.3          Firewall

6.            Network management Security

    6.1          Basic Concept of SNMP

    6.2          SNMPv1

    6.3          SNMPv3

Related Posts:


Google Maps

Hamro Patro

Popular Posts