Tag: Course Lectuers

Online Audio and Video Lectures on Computer Networking

Prof. Shiv Kalyanaraman’s Online Audio and Video Lectures on Computer Networking Fundamentals of Wireless Broadband Networks (Lecture Slides & Video) Broadband and Optical Networks Internet Protocols Computer Communication Networks http://www.ecse.rpi.edu/Homepages/koushik/shivkuma-teaching/video_index.html

Permanent link to this article: https://www.darknessgate.com/2014/09/12/online-audio-video-lectures-computer-networking/

Introduction to Computer Networking

This course provides an introduction to fundamental concepts in the design and implementation of computer communication networks, their protocols, and applications. Topics to be covered include: overview of  network architectures, applications (HTTP, FTP), network programming interfaces (e.g., sockets), transport (TCP, UDP), flow control, congestion control, IP, routing , IPv6, multicast, data link protocols, error-detection/correction, multiple …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/12/introduction-computer-networking/

Networks and Protocols

The course discusses computer network and network protocols in some depth in order to enable students to understand the core issues involved in network protocol design. The fundamental algorithms and principles are explained in the context of existing IEEE / Internet protocols in order to demonstrate how fundamental principles are applied in real-world protocols. This …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/12/networks-protocols/

Audio/Video Recordings about Wireless and Mobile Networking

CSE574:Wireless and Mobile Networks (2010) – Podcasts available: (2008, 2006 also available) Course Overview | Wireless Networking: Issues and Trends | Wireless Physical Layer Concepts: Part I, Part II, Part III | Wireless Local Area Networks: Part I, Part II | Wireless Personal Area Networks: Part I, Part II | Wireless Metropolitan Area Networks: Part …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/12/audiovideo-recordings-wireless-mobile-networking/

Security Protocols (Advanced Topics in Cryptology)

This course will cover some of the latest cryptographic techniques for security protocols. This course intends to stimulate students in their own research – improve their ability of extracting, presenting, and discussing results from recent papers on a certain topic and try to extend/improve them. Course Outline Basics in cryptology – cryptosystems, digital signatures, (keyed) …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/10/security-protocols-advanced-topics-cryptology/

CS 276, Spring 2006 Cryptography


Permanent link to this article: https://www.darknessgate.com/2014/09/10/cs-276-spring-2006-cryptography/

TSIT03 Cryptology 2013

The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/

Course F21CN: Computer Network Security

The purpose of Course F21CN Computer Network Security is to provide a solid understanding of the main issues related to security in modern networked computer systems. This covers underlying concepts and foundations of computer security, basic knowledge about security-relevant decisions in designing IT infrastructures, techniques to secure complex systems and practical skills in managing a …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/07/course-f21cn-computer-network-security/

CNIT 121: Computer Forensics

The class covers forensics tools, methods, and procedures used for investigation of computers, techniques of data recovery and evidence collection, protection of evidence, expert witness skills, and computer crime investigation techniques. Includes analysis of various file systems and specialized diagnostic software used to retrieve data. Upon successful completion of this course, the student will be …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/06/cnit-121-computer-forensics/

Cryptography and Computer Security (CCS)

This subject provides an explanation of basic contents of IT security. It focuses on the symetric and public-key cryptography, cryptographic hash functions, authentication protocols, digital signatures and certificates. Course contains a survey of standards and covers legislative aspects of IT security. Course goal is introduction to algorithms and fundamentals of security protocols and technics. The …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/06/cryptography-computer-security-ccs/

6.857: Computer and Network Security

6.857: Computer and Network Security by Massachusetts Institute of Technology http://courses.csail.mit.edu/6.857/2014/handouts

Permanent link to this article: https://www.darknessgate.com/2014/09/05/6-857-computer-network-security/