-
Lecture 1 Introduction
-
Course Synopsis of Computer and Network security
-
Refereed e-Book of Computer and Network security
-
Syllabus of Computer and Network Security
-
Previous NU Board question of Network security
-
PowerPoint Slide of Chapter 1: Introduction
-
Network Security basic Concepts and Types of attacks
-
Tahmina Aktar Trisha-DIIT- Security Goals and Threats
-
Network Security Demonstrate by--Cisco
-
Recent Network Security Articles
-
-
Lecture 2 : Network Security and Access model
-
PowerPoint Slide of Chapter 1: Network security model
-
Network Security Model Explained Easily
-
Quiz 1: Chapter 110 xp
-
Trisha's Hand notes on- Chapter 1- Introduction
-
Sample Mid Term Question
-
Tahmina Aktar Trisha-DIIT- Network Security- Active and Passive attacks
-
Video on Security Attacks
- My video Link
-
Video of Conducted Quiz 1
-
- Lecture 3 : Cryptography
- Lecture 4: Poly alphabetic, Mono Alphabetic, Hill Ciphers
-
Lecture 5: Block Ciphers and Encryption standard method
-
PowerPoint slide of Chapter 3: Block Cipher and DES
-
Quiz 2: Chapter 210 xp
-
NETWORK SECURITY - DES (DATA ENCRYPTION STANDARD) ALGORITHM
-
Feistel Cipher
-
Published Research on DES
-
Trisha's Hand notes on- Chapter 3- Block cipher & Data encryption standard
-
Conducted Quiz 2: Chapter 2
-
NETWORK SECURITY - FEISTEL STRUCTURE
-
DES encryption animation and example part 4(DES)
-
- Lecture 6: Double DES
- Lecture 7: Block cipher modes of operation
- Lecture 8: Confidentiality using Symmetric Encryption
- Lecture 9: Key Distribution scenario
- Lecture 10: RSA Algorithm
-
Lecture 11: Key Management
-
PowerPoint Slide of Chapter 10: Key Management
-
Public Key Distribution - Public Key Authority and Public Key Certificate
-
Class (Recorded) on public key authority
-
Trisha's Hand notes on- Chapter 10- Key Management
-
X.509 AUTHENTICATION SERVICE PART 1 - NETWORK SECURITY
-
Research on Digital signature
-
The Key authority - secure key management
-
-
Lecture 12: Diffie Hellman Key exchange algorithm
-
PowerPoint Slide chapter 10: Diffie Hellman Algorithm
-
Trisha's Hand notes on- Chapter 10- Diffie Hellman Algorithm
-
Research article on Diffie Hellman Algorithm
-
Class (Recorded) on Diffie Hellman Algorithm
-
NETWORK SECURITY - DIFFIE HELLMAN KEY EXCHANGE ALGORITHM
-
Mathematical Practice on Diffie Hellman Key Exchange Algorithm
-
Assignment on Diffie hellman key exchange algorithm
-
- Lecture 13: Man in the Middle attack
- Lecture 14: MAC ad Hash function
- Lecture 16: SHA Algorithm
- Lecture 17 : Digital signatures
- Lecturer 18: Electronic Mail Security
- Lecture 19: IP Security
- Lecture 20: Firewall
- Certification
- Skill Development
Network Security basic Concepts and Types of attacks
- https://meet.google.com/zkc-ecgm-zbx About
- Statistics
- Share
Views | |
---|---|
177 | Total Views |
2 | Members Views |
175 | Public Views |
Share by mail
Please login to share this video by email.