Tag Archive: Security learning

Online Audio and Video Lectures on Computer Networking

Prof. Shiv Kalyanaraman’s Online Audio and Video Lectures on Computer Networking Fundamentals of Wireless Broadband Networks (Lecture Slides & Video) Broadband and Optical Networks Internet Protocols Computer Communication Networks http://www.ecse.rpi.edu/Homepages/koushik/shivkuma-teaching/video_index.html

Permanent link to this article: http://www.darknessgate.com/2014/09/12/online-audio-video-lectures-computer-networking/

Networks and Protocols

The course discusses computer network and network protocols in some depth in order to enable students to understand the core issues involved in network protocol design. The fundamental algorithms and principles are explained in the context of existing IEEE / Internet protocols in order to demonstrate how fundamental principles are applied in real-world protocols. This …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/12/networks-protocols/

Audio/Video Recordings about Wireless and Mobile Networking

CSE574:Wireless and Mobile Networks (2010) – Podcasts available: (2008, 2006 also available) Course Overview | Wireless Networking: Issues and Trends | Wireless Physical Layer Concepts: Part I, Part II, Part III | Wireless Local Area Networks: Part I, Part II | Wireless Personal Area Networks: Part I, Part II | Wireless Metropolitan Area Networks: Part …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/12/audiovideo-recordings-wireless-mobile-networking/

Security Protocols (Advanced Topics in Cryptology)

This course will cover some of the latest cryptographic techniques for security protocols. This course intends to stimulate students in their own research – improve their ability of extracting, presenting, and discussing results from recent papers on a certain topic and try to extend/improve them. Course Outline Basics in cryptology – cryptosystems, digital signatures, (keyed) …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/10/security-protocols-advanced-topics-cryptology/

TSIT03 Cryptology 2013

The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/

Cryptography and Computer Security (CCS)

This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security. Course goal is introduction to algorithms and fundamentals of security protocols and technics. The …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/06/cryptography-computer-security-ccs/

6.857: Computer and Network Security

6.857: Computer and Network Security by Massachusetts Institute of Technology http://courses.csail.mit.edu/6.857/2014/handouts

Permanent link to this article: http://www.darknessgate.com/2014/09/05/6-857-computer-network-security/

Online Cryptography Course

In the following, free videos of a two-semester course in cryptography are available. The 23 lectures give a fairly comprehensive introduction to modern applied cryptography. http://wiki.crypto.rub.de/Buch/movies.php

Permanent link to this article: http://www.darknessgate.com/2014/09/03/online-cryptography-course/

List of Free Online Networking Courses and Classes

A variety of free computer networking courses are available online for learners at different levels. These free computer networking courses do not lead to college credit. Students can take advantage of the free courses to advance in a career or to learn new skills in the field of computer science. http://education-portal.com/articles/List_of_Free_Online_Networking_Courses_and_Classes.html

Permanent link to this article: http://www.darknessgate.com/2014/09/02/list-free-online-networking-courses-classes/

Homomorphic Encryption and Lattices

This is a three-credit advanced graduate level course. The course is one of the electives for MS students in the Foundations of Computer Science Track and the Computer Security Track, and for undergraduates in the Foundations of Computer Science Track. It also serves as a general elective for the PhD program in computer science. The …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/02/homomorphic-encryption-lattices/

Applied Cryptography

Have you wondered how one might define security — even for a cryptographic concept as simple and familiar as encryption? What makes public-key cryptography possible? (Well, what is public-key cryptography?) What is MD5 and what’s wrong with it? What is homomorphic encryption? What are zero-knowledge proofs (and are they for real)? What magical tools can …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/01/applied-cryptography/

Page 5 of 11« First...34567...Last »