Use the Cryptography and Network Security course and lab to learn about cryptography and cryptanalysis. The lab provides a hands-on learning experience in a safe and online environment. The online cryptography course and lab provide an understanding of the algorithms used to protect users online. It covers topics like identity-based encryption, attribute-based encryption, functional encryption, two-party/multi-party computation, bitcoin and crypto-currency, and post-quantum cryptography.
Lessons
28+ Lessons | 130+ Quizzes | 201+ Flashcards | 201+ Glossary of terms
TestPrep
60+ Pre Assessment Questions | 2+ Full Length Tests | 60+ Post Assessment Questions | 120+ Practice Test Questions
Hand on lab
33+ LiveLab | 32+ Video tutorials | 44+ Minutes
Lessons 1: Information and Network Security Concepts
- Cybersecurity, Information Security, and Network Security
- The OSI Security Architecture
- Security Attacks
- Security Services
- Security Mechanisms
- Â Cryptography
- Network Security
- Trust and Trustworthiness
- Standards
Lessons 2: Introduction to Number Theory
- Divisibility and The Division Algorithm
- The Euclidean Algorithm
- Modular Arithmetic
- Prime Numbers4
- Fermat’s and Euler’s Theorems
- Testing for Primality
- The Chinese Remainder Theorem
- Discrete Logarithms
- Appendix 2A: The Meaning of Mod
Lessons 3: Classical Encryption Techniques
- Symmetric Cipher Model
- Substitution Techniques
- Transposition Techniques
Lessons 4: Block Ciphers and the Data Encryption Standard
- Traditional Block Cipher Structure
- The Data Encryption Standard
- A DES Example
- The Strength of DES
- Block Cipher Design Principles
Lessons 5: Finite Fields
- Groups
- Rings
- Fields
- Finite Fields of the Form GF(p)
- Polynomial Arithmetic
- Finite Fields of the Form GF (2n)
Lessons 6: Advanced Encryption Standard
- Finite Field Arithmetic
- AES Structure
- AES Transformation Functions
- AES Key Expansion
- An AES Example
- AES Implementation
- Appendix 6A: Polynomials with Coefficients in GF(28)
Lessons 7: Block Cipher Operation
- Multiple Encryption and Triple DES
- Electronic CodeBook
- Cipher Block Chaining Mode
- Cipher Feedback Mode
- Output Feedback Mode
- Counter Mode
- XTS-AES Mode for Block-Oriented Storage Devices
- Format-Preserving Encryption
Lessons 8: Random Bit Generation and Stream Ciphers
- Principles of Pseudorandom Number Generation
- Pseudorandom Number Generators
- Pseudorandom Number Generation Using a Block Cipher
- Stream Ciphers
- RC4
- Stream Ciphers Using Feedback Shift Registers
- True Random Number Generators
Lessons 9: Public-Key Cryptography and RSA
- Principles of Public-Key Cryptosystems
- The RSA Algorithm
Lessons 10: Other Public-Key Cryptosystems
- Diffie–Hellman Key Exchange
- Elgamal Cryptographic System
- Elliptic Curve Arithmetic
- Elliptic Curve Cryptography
Lessons 11: Cryptographic Hash Functions
- Applications of Cryptographic Hash Functions
- Two Simple Hash Functions
- Requirements and Security
- Secure Hash Algorithm (SHA)
- SHA-3
Lessons 12: Message Authentication Codes
- Message Authentication Requirements
- Message Authentication Functions
- Requirements for Message Authentication Codes
- Security of MACs
- MACs Based on Hash Functions: HMAC
- MACs Based on Block Ciphers: DAA and CMAC
- Authenticated Encryption: CCM and GCM
- Key Wrapping
- Pseudorandom Number Generation Using Hash Functions and MACs
Lessons 13: Digital Signatures
- Digital Signatures
- Elgamal Digital Signature Scheme
- Schnorr Digital Signature Scheme
- Nist Digital Signature Algorithm
- Elliptic Curve Digital Signature Algorithm
- RSA-PSS Digital Signature Algorithm
Lessons 14: Lightweight Cryptography and Post-Quantum Cryptography
- Lightweight Cryptography Concepts
- Lightweight Cryptographic Algorithms
- Post-Quantum Cryptography Concepts
- Post-Quantum Cryptographic Algorithms
Lessons 15: Cryptographic Key Management and Distribution
- Symmetric Key Distribution Using Symmetric Encryption
- Symmetric Key Distribution Using Asymmetric Encryption
- Distribution of Public Keys
- X.509 Certificates
- Public-Key Infrastructure
Lessons 16: User Authentication
- Remote User-Authentication Principles
- Remote User-Authentication Using Symmetric Encryption
- Kerberos
- Remote User-Authentication Using Asymmetric Encryption
- Federated Identity Management
Lessons 17: Transport-Level Security
- Web Security Considerations
- Transport Layer Security
- HTTPS
- Secure Shell (SSH)
Lessons 18: Wireless Network Security
- Wireless Security
- Mobile Device Security
- IEEE 802.11 Wireless LAN Overview
- IEEE 802.11i Wireless LAN Security
Lessons 19: Electronic Mail Security
- Internet Mail Architecture
- Email Formats
- Email Threats and Comprehensive Email Security
- S/MIME
- DNSSEC
- DNS-Based Authentication of Named Entities
- Sender Policy Framework
- Domainkeys Identified Mail
- Domain-Based Message Authentication, Reporting, and Conformance
Lessons 20: IP Security
- IP Security Overview
- IP Security Policy
- Encapsulating Security Payload
- Combining Security Associations
- Internet Key Exchange
Lessons 21: Network Endpoint Security
- Firewalls
- Intrusion Detection Systems
- Malicious Software
- Distributed Denial of Service Attacks
Lessons 22: Cloud Security
- Cloud Computing
- Cloud Security Concepts
- Cloud Security Risks and Countermeasures
- Cloud Security as a Service
- An Open-Source Cloud Security Module
Lessons 23: Internet of Things (IoT) Security
- The Internet of Things
- IoT Security Concepts and Objectives
- An Open-Source IoT Security Module
Appendix A: Basic Concepts from Linear Algebra
- A.1 Operations on Vectors and Matrices
- A.2 Linear Algebra Operations Over Zn
Appendix B: Measures of Secrecy and Security
- B.1 Conditional Probability
- B.2 Perfect Secrecy
- B.3 Information and Entropy
- B.4 Entropy and Secrecy
- B.5 Min-Entropy
Appendix C: Data Encryption Standard
Appendix D: Simplified AES
- D.1 Overview
- D.2 S-AES Encryption and Decryption
- D.3 Key Expansion
- D.4 The S-box
- D.5 S-AES Structure
Appendix E: Mathematical Basis of the Birthday Attack
- E.1 Related Problem
- E.2 The Birthday Paradox
- E.3 Useful Inequality
- E.4 The General Case of Duplications
- E.5 Overlap Between Two Sets
Hands-on LAB Activities
Information and Network Security Concepts
- Obtaining Information about an IP Version
- Getting Information about the DNS
- Getting Information about the UDP Ports
- Getting Information about the Current Connection Statistics of UDP
- Getting the UDP Settings
- Getting Information about the TCP Ports
- Getting Information about the Current Connection Statistics of TCP
- Getting the TCP Settings
- Obtaining Information about the Net Firewall Profile
- Obtaining IP Route Information from the IP Routing Table
Classical Encryption Techniques
- Using OWASP ZAP
- Performing Symmetric Encryption
Advanced Encryption Standard
- Encrypting a File or Folder
- Configuring File and Share Permissions
- Using BitLocker in Windows 10
- Configuring MDT
- Creating a New Partition and Configuring BitLocker
- Implementing AES Encryption
Public-Key Cryptography and RSA
- Using OpenSSL to Create a Public/Private Key Pair
- Using the RSA Asymmetric Algorithm
Cryptographic Hash Functions
- Installing Windows Server Backup and Performing Backup of a Folder
- Creating a Backup Schedule
- Creating a Backup Once
- Configuring RAID
- Configuring RAID 5
- Installing the Failover Cluster Feature
- Using the Dependency Viewer
Cryptographic Key Management and Distribution
- Using Steganography
- Enabling a Keylogger in a Target Machine
IP Security
- Adding Revision to the Revision History
- Viewing and Downloading the Policy Templates
- Opening the Policy Template and Setting the Company Name
- Reviewing and Modifying the Policy Items
Reviews
There are no reviews yet.