Video Lectures about computer security
http://iiscs.wssu.edu/drupal/node/4698
Course Resources:
Introduction
Introduction to Classical Cryptography
The Threat Environment, Basic Security Terminology, Case Study: The Tjx Data Breach
The Threat Environment (cont…), Employee and Ex-Employee (Insider) Threats
Traditional External Attackers, Classic Malware: Viruses and Worms, Trojan Horses and Rootkits
Trojan Horses and Rootkits (cont…), Other Malware Attacks
Hackers, Social Engineering used by Hackers
Cryptography :Definitions & Concepts, Kerckhoff’s Principle, Strength of the Cryptosystem, Services of Cryptosystems
Cryptography (cont…), One-Time Pad, Steganography, Types of Ciphers
Methods of Encryption, Symmetric Cryptography, Asymmetric Cryptography, Symmetric vs Asymmetric Algorithms
Symmetric Algorithms, Block Ciphers, Stream Ciphers, Hybrid Encryption Systems
Types of Symmetric Systems, Data Encryption Standard (DES)
DES (cont…), Triple DES (3DES)
Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), Blowfish, RC4, RC5, RC6, Review of Cryptogra
Asymmetric Key Algorithms, Diffie Hellman Algorithm, RSA Algorithm
Difference between Public Key Cryptography and Public Key Infrastructure (PKI), One-Way Functions, El Gamal, Elliptic Curve Cryp
Message Integrity, Message Authentication Codes (MAC), HMAC Example, CBC-MAC
MAC (cont…), CMAC, Types of Hashing Algorithms, Desired Features of Cryptographic Hash Functions, Hashing Algorithms used Toda
Review of Symmetric Asymmetric and Hashing Algorithms, Digital Signatures, Digital Signature Standard (DSS), Public Key Infrastr
PKI (cont…), PKI Components, Certificate Authority (CA), Functions of a Certificate Authority, Certificate Revocation List (CR
Online Certificate Status Protocol (OCSP), Certificates and X.509, Registration Authority (RA), PKI Example, PKI Components, PKI
Review of PKI Digital Certificates Certificate Structure and PKI Services, Key Management, Kerberos Protocol, Key Management Pri
Link Encryption vs End-to-End Encryption, Encryption at Different Layers, Hardware vs Software Cryptography Systems, Email Stand
Review of Link Encryption vs End-to-End Encryption, Email Standards (cont…)
– See more at: http://iiscs.wssu.edu/drupal/node/4698#sthash.MtDlHFEa.dpuf