Cryptography And Network Security
Use the Cryptography and Network Security course and lab to learn about cryptography and cryptanalysis. The lab provides a hands-on learning experience in a safe and online environment. The online cryptography course and lab provide an understanding of the algorithms used to protect users online. It covers topics like identity-based encryption, attribute-based encryption, functional encryption, two-party/multi-party computation, bitcoin and crypto-currency, and post-quantum cryptography.
- Price: $279.99
- Delivery method: eLearning
- DIR Discount: 20%
Submit form to obtain discount
Test Prep
60+ Pre Assessment Questions |
2+ Full Length Tests |
60+ Post Assessment Questions |
120+ Practice Test Questions
Features
33+ LiveLab |
32+ Video tutorials |
44+ Minutes
Why choose TOPTALENT?
- Get assistance every step of the way from our Texas-based team, ensuring your training experience is hassle-free and aligned with your goals.
- Access an expansive range of over 3,000 training courses with a strong focus on Information Technology, Business Applications, and Leadership Development.
- Have confidence in an exceptional 95% approval rating from our students, reflecting outstanding satisfaction with our course content, program support, and overall customer service.
- Benefit from being taught by Professionally Certified Instructors with expertise in their fields and a strong commitment to making sure you learn and succeed.
Outline
Lessons 1:
Information and Network Security Concepts
- Cybersecurity, Information Security, and Network Security
- The OSI Security Architecture
- Security Attacks
- Security Services
- Security Mechanisms
- Cryptography
- Network Security
- Trust and Trustworthiness
- Standards
Lessons 2:
Introduction to Number Theory
- Divisibility and The Division Algorithm
- The Euclidean Algorithm
- Modular Arithmetic
- Prime Numbers4
- Fermat’s and Euler’s Theorems
- Testing for Primality
- The Chinese Remainder Theorem
- Discrete Logarithms
- Appendix 2A: The Meaning of Mod
Lessons 3:
Classical Encryption Techniques
- Symmetric Cipher Model
- Substitution Techniques
- Transposition Techniques
Lessons 4:
Block Ciphers and the Data Encryption Standard
- Traditional Block Cipher Structure
- The Data Encryption Standard
- A DES Example
- The Strength of DES
- Block Cipher Design Principles
Lessons 5:
Finite Fields
- Groups
- Rings
- Fields
- Finite Fields of the Form GF(p)
- Polynomial Arithmetic
- Finite Fields of the Form GF (2n)
Lessons 6:
Advanced Encryption Standard
- Finite Field Arithmetic
- AES Structure
- AES Transformation Functions
- AES Key Expansion
- An AES Example
- AES Implementation
- Appendix 6A: Polynomials with Coefficients in GF(28)
Lessons 7:
Block Cipher Operation
- Multiple Encryption and Triple DES
- Electronic CodeBook
- Cipher Block Chaining Mode
- Cipher Feedback Mode
- Output Feedback Mode
- Counter Mode
- XTS-AES Mode for Block-Oriented Storage Devices
- Format-Preserving Encryption
Lessons 8:
Random Bit Generation and Stream Ciphers
- Principles of Pseudorandom Number Generation
- Pseudorandom Number Generators
- Pseudorandom Number Generation Using a Block Cipher
- Stream Ciphers
- RC4
- Stream Ciphers Using Feedback Shift Registers
- True Random Number Generators
Lessons 9:
Public-Key Cryptography and RSA
- Principles of Public-Key Cryptosystems
- The RSA Algorithm
Lessons 10:
Other Public-Key Cryptosystems
- Diffie–Hellman Key Exchange
- Elgamal Cryptographic System
- Elliptic Curve Arithmetic
- Elliptic Curve Cryptography
Lessons 11:
Cryptographic Hash Functions
- Applications of Cryptographic Hash Functions
- Two Simple Hash Functions
- Requirements and Security
- Secure Hash Algorithm (SHA)
- SHA-3
Lessons 12:
Message Authentication Codes
- Message Authentication Requirements
- Message Authentication Functions
- Requirements for Message Authentication Codes
- Security of MACs
- MACs Based on Hash Functions: HMAC
- MACs Based on Block Ciphers: DAA and CMAC
- Authenticated Encryption: CCM and GCM
- Key Wrapping
- Pseudorandom Number Generation Using Hash Functions and MACs
Lessons 13:
Digital Signatures
- Digital Signatures
- Elgamal Digital Signature Scheme
- Schnorr Digital Signature Scheme
- Nist Digital Signature Algorithm
- Elliptic Curve Digital Signature Algorithm
- RSA-PSS Digital Signature Algorithm
Lessons 14:
Lightweight Cryptography and Post-Quantum Cryptography
- Lightweight Cryptography Concepts
- Lightweight Cryptographic Algorithms
- Post-Quantum Cryptography Concepts
- Post-Quantum Cryptographic Algorithms
Lessons 15:
Cryptographic Key Management and Distribution
- Symmetric Key Distribution Using Symmetric Encryption
- Symmetric Key Distribution Using Asymmetric Encryption
- Distribution of Public Keys
- X.509 Certificates
- Public-Key Infrastructure
Lessons 16:
User Authentication
- Remote User-Authentication Principles
- Remote User-Authentication Using Symmetric Encryption
- Kerberos
- Remote User-Authentication Using Asymmetric Encryption
- Federated Identity Management
Lessons 17:
Transport-Level Security
- Web Security Considerations
- Transport Layer Security
- HTTPS
- Secure Shell (SSH)
Lessons 18:
Wireless Network Security
- Wireless Security
- Mobile Device Security
- IEEE 802.11 Wireless LAN Overview
- IEEE 802.11i Wireless LAN Security
Lessons 19:
Electronic Mail Security
- Internet Mail Architecture
- Email Formats
- Email Threats and Comprehensive Email Security
- S/MIME
- DNSSEC
- DNS-Based Authentication of Named Entities
- Sender Policy Framework
- Domainkeys Identified Mail
- Domain-Based Message Authentication, Reporting, and Conformance
Lessons 20:
IP Security
- IP Security Overview
- IP Security Policy
- Encapsulating Security Payload
- Combining Security Associations
- Internet Key Exchange
Lessons 21:
Network Endpoint Security
- Firewalls
- Intrusion Detection Systems
- Malicious Software
- Distributed Denial of Service Attacks
Lessons 22:
Cloud Security
- Cloud Computing
- Cloud Security Concepts
- Cloud Security Risks and Countermeasures
- Cloud Security as a Service
- An Open-Source Cloud Security Module
Lessons 23:
Internet of Things (IoT) Security
- The Internet of Things
- IoT Security Concepts and Objectives
- An Open-Source IoT Security Module
Appendix A: Basic Concepts from Linear Algebra
- A.1 Operations on Vectors and Matrices
- A.2 Linear Algebra Operations Over Zn
Appendix B: Measures of Secrecy and Security
- B.1 Conditional Probability
- B.2 Perfect Secrecy
- B.3 Information and Entropy
- B.4 Entropy and Secrecy
- B.5 Min-Entropy
Appendix C: Data Encryption Standard
Appendix D: Simplified AES
- D.1 Overview
- D.2 S-AES Encryption and Decryption
- D.3 Key Expansion
- D.4 The S-box
- D.5 S-AES Structure
Appendix E: Mathematical Basis of the Birthday Attack
- E.1 Related Problem
- E.2 The Birthday Paradox
- E.3 Useful Inequality
- E.4 The General Case of Duplications
- E.5 Overlap Between Two Sets