Mastering Cryptography: Techniques and Network Security Essentials
Unlock the Secrets of Data Protection: Master Cryptography and Network Security with Neso Academy! Dive into ciphers, encryption techniques, and security protocols to defend against cyber threats and enhance your digital expertise.
5.0 (32)
258 learners
What you'll learn
Understand fundamental cryptography and network security principles
Identify and analyze various security attacks and mechanisms
Apply encryption techniques such as DES and AES for data protection
Utilize and implement public key cryptography and digital signatures
Identify and analyze various security attacks and mechanisms
Apply encryption techniques such as DES and AES for data protection
Utilize and implement public key cryptography and digital signatures
This course includes
- 14.7 hours of video
- Certificate of completion
- Access on mobile and TV
Course content
1 modules • 83 lessons • 14.7 hours of video
Comprehensive Guide to Cryptography and Network Security
83 lessons • 14.7 hours
▶
Comprehensive Guide to Cryptography and Network Security
83 lessons • 14.7 hours
- Introduction to Cryptography and Network Security10:17
- CIA Triad16:08
- The OSI Security Architecture08:40
- Security Attacks15:54
- Security Services08:55
- Security Mechanisms11:58
- Network Security Model11:46
- Cryptography13:33
- Cryptography – Key Terms09:39
- Cryptanalysis11:31
- Brute Force Attack08:45
- Classical Encryption Techniques08:31
- Caesar Cipher (Part 1)13:22
- Caesar Cipher (Part 2)09:44
- Monoalphabetic Cipher15:59
- Playfair Cipher (Part 1)12:49
- Playfair Cipher (Part 2)11:25
- Playfair Cipher (Solved Question)12:09
- Hill Cipher (Encryption)17:39
- Hill Cipher (Decryption)30:02
- Polyalphabetic Cipher (Vigenère Cipher)13:56
- Polyalphabetic Cipher (Vernam Cipher)07:55
- One Time Pad07:37
- Rail Fence Technique06:46
- Row Column Transposition Ciphering Technique08:15
- Steganography06:40
- LSB Steganography - Demo12:58
- Cryptography (Solved Questions)10:52
- Abstract Algebra and Number Theory08:01
- Prime Numbers in Cryptography10:19
- Modular Arithmetic (Part 1)10:56
- Modular Arithmetic (Part 2)11:38
- Modular Exponentiation (Part 1)10:20
- Modular Exponentiation (Part 2)19:38
- GCD - Euclidean Algorithm (Method 1)14:38
- GCD - Euclidean Algorithm (Method 2)10:00
- Relatively Prime (Co-Prime) Numbers09:45
- Euler’s Totient Function (Phi Function)08:40
- Euler’s Totient Function (Solved Examples)12:52
- Fermat's Little Theorem07:31
- Euler's Theorem08:14
- Primitive Roots09:16
- Multiplicative Inverse10:02
- Extended Euclidean Algorithm (Solved Example 1)10:15
- Extended Euclidean Algorithm (Solved Example 2)05:42
- Extended Euclidean Algorithm (Solved Example 3)06:53
- The Chinese Remainder Theorem (Solved Example 1)14:22
- The Chinese Remainder Theorem (Solved Example 2)12:05
- The Discrete Logarithm Problem08:19
- The Discrete Logarithm Problem (Solved Example)04:41
- Prime Factorization (Fermat's Factoring Method)08:55
- Testing for Primality (Fermat's Test)08:22
- Testing for Primality (Miller-Rabin Test)10:19
- Group and Abelian Group10:44
- Cyclic Group12:27
- Rings, Fields and Finite Fields13:03
- Stream Cipher vs. Block Cipher09:46
- Feistel Cipher Structure14:12
- Introduction to Data Encryption Standard (DES)08:18
- Single Round of DES Algorithm13:33
- The F Function of DES (Mangler Function)10:29
- Key Scheduling and Decryption in DES09:48
- Avalanche Effect and the Strength of DES10:33
- Data Encryption Standard (DES) - Solved Questions07:02
- Introduction to Advanced Encryption Standard (AES)11:06
- AES Encryption and Decryption13:24
- AES Round Transformation11:03
- AES Key Expansion14:56
- AES Security and Implementation Aspects08:53
- Multiple Encryption and Triple DES20:54
- Block Cipher Modes of Operation06:59
- Electronic Codebook (ECB)11:29
- Cipher Block Chaining (CBC)08:37
- Cipher Feedback (CFB)13:46
- Output Feedback (OFB)10:04
- Counter Mode (CTR)09:04
- Block Cipher Modes of Operation (Solved Question)06:57
- Pseudorandom Number Generator (PRNG)11:36
- Golomb’s Randomness Postulates14:23
- Public Key Cryptography | Chapter-4 | Cryptography & Network Security | nesoacademy.org01:39
- Hash Functions & Digital Signatures | Chapter-5 | Cryptography & Network Security | nesoacademy.org01:05
- System Practices & System Security | Chapter-6 | Cryptography & Network Security | nesoacademy.org01:40
- Web, Email, & IP Security | Chapter-7 | Cryptography & Network Security | nesoacademy.org01:28