Home
Events
Forum
Courses
Application
Contact us
Career
Wiki
Exam Status
Sign in
Contact Us
Courses
Computer and Network Security
Nav
Home
└
Computer and Network Security
Computer and Network Security
Join Course
More info
Responsible
Tahmina Aktar Trisha
Last Update
05/31/2021
Completion Time
3 days 49 minutes
Members
9
Share
Course
Reviews
Tahmina Aktar Trisha
Lecture 1
Course Synopsis of Computer and Network security
Refereed e-Book of Computer and Network security
Preview
Syllabus of Computer and Network Security
Preview
Previous NU Board question of Network security
Preview
PowerPoint Slide of Chapter 1: Introduction
Preview
NETWORK SECURITY - BASIC CONCEPTS
Preview
Tahmina Aktar Trisha-DIIT- Security Goals and Threats
Preview
Network Security Demonstrate by--Cisco
Preview
Recent Network Security Articles
Preview
Lecture 2 : Network Security and Access model
PowerPoint Slide of Chapter 1: Network security model
Preview
Network Security Model Explained Easily
Preview
Quiz 1: Chapter 1
Preview
Trisha's Hand notes on- Chapter 1- Introduction
Preview
Sample Mid Term Question- Network Security
Preview
Tahmina Aktar Trisha-DIIT- Network Security- Active and Passive attacks
Preview
Video on Security Attacks
Preview
Class Recorded on Conducted Quiz 1
Preview
Lecture 3 : Cryptography
PowerPoint Slide of Chapter : 2 Cryptography
Preview
Public Key Cryptography - Computerphile
Preview
Symmetric Key and Public Key Encryption
Preview
Trisha's- Hand notes on- Chapter 2- Classical Encryption Technique
Preview
Research on Unshared Secret Key Cryptography
Lecture 4: Poly alphabetic, Mono Alphabetic, Hill Ciphers
PowerPoint Slide of Chapter : 2 Cryptography
Preview
Polyalphabetic Substitution Cipher explained step by step with example !!!
Preview
Playfair Cipher || Network Security in Bangla || How to convert Plaintext into Cipher text in bangla
Preview
hill cipher decryption 3×3 matrix
Preview
One time pad Cipher (Vernam Cipher)
Preview
Trisha's- Hand notes on- Chapter 2- Ciphers
Preview
Lecture 5: Block Ciphers and Encryption standard method
PowerPoint slide of Chapter 3: Block Cipher and DES
Preview
Quiz 2: Chapter 2
Preview
NETWORK SECURITY - DES (DATA ENCRYPTION STANDARD) ALGORITHM
Preview
Feistel Cipher - Computerphile
Preview
Published Research on DES
Preview
Trisha's Hand notes on- Chapter 3- Block cipher & Data encryption standard
Preview
Class Recorded on Conducted Quiz 2
Preview
NETWORK SECURITY - FEISTEL STRUCTURE
Preview
DES encryption animation and example part 4(DES)
Preview
Lecture 6: Double DES
Recorded Link of Class on Double DES
Preview
PowerPoint slide of Chapter 6: Double DES
Preview
S Box (Substitution Box)
Preview
S-Box Theory
Preview
Trisha's Hand notes on- Chapter 6- More on Symmetric ciphers
Preview
Recorded Link of Conducted demo Quiz
Preview
Lecture 7: Block cipher modes of operation
PowerPoint Slide of Chapter 6: Block Cipher Modes
Preview
NETWORK SECURITY - BLOCK CIPHER MODES OF OPERATION
Preview
Research on Block Cipher modes
Preview
Recorded Link of Class on Block Cipher Modes of operation
Preview
Trisha's Hand notes on- Chapter 6- Block ciphers Modes
Preview
Lecture 8: Confidentiality using Symmetric Encryption
PowerPoint Slide of Chapter 7: Confidentiality using symmetric Encryption
Preview
Session Keys
Preview
Recorded Link of Class on Link & end-to-end encryption
Preview
Link encryption vs. End to end encryption
Preview
Trisha's Hand notes on- Chapter 7- Confidentiality using symmetric encryption
Preview
Lecture 9: Key Distribution scenario
PowerPoint Slide of Chapter 7: Key distribution Scenario
Preview
NETWORK SECURITY - PUBLIC KEY DISTRIBUTION
Preview
Trisha's Hand notes on- Chapter 7- Public Key Distribution
Preview
Wireless Authentication and Key Generation
Preview
Recorded Link of class on key distribution
Preview
Research on Key distribution
Preview
Lecture 10: RSA Algorithm
PowerPoint Slide of Chapter 9: Public Key cryptography & RSA
Preview
The Practice of RSA Algorithm
Preview
NETWORK SECURITY - RSA ALGORITHM
Preview
Trisha's Hand notes on- Chapter 9- Public Key cryptography & RSA
Preview
Assignment on RSA Algorithm
Preview
Recorded Link of Class on RSA Algorithm
Preview
Research Article on RSA Algorithm
Preview
Lecture 11: Key Management
PowerPoint Slide of Chapter 10: Key Management
Preview
Public Key Distribution - Public Key Authority and Public Key Certificate
Preview
Recorded Link of Class on public key authority
Preview
Trisha's Hand notes on- Chapter 10- Key Management Document
Preview
X.509 AUTHENTICATION SERVICE PART 1 - NETWORK SECURITY
Preview
Research on Digital signature
Preview
The Key authority - secure key management
Preview
Lecture 12: Diffie Hellman Key exchange algorithm
PowerPoint Slide chapter 10: Diffie Hellman Algorithm
Preview
Trisha's Hand notes on- Chapter 10- Diffie Hellman Algorithm
Preview
Research article on Diffie Hellman Algorithm
Preview
Recorded Link of Class on Diffie Hellman Algorithm
Preview
NETWORK SECURITY - DIFFIE HELLMAN KEY EXCHANGE ALGORITHM
Preview
Mathematical Practice on Diffie Hellman Key Exchange Algorithm
Preview
Assignment on Diffie Hellman key exchange algorithm
Preview
Lecture 13: Man in the Middle attack
NETWORK SECURITY - TYPES OF AUTHENTICATION (Message Encryption, MAC, Hash Functions)
Preview
PowerPoint Slide chapter 10: Man in the Middle attack
Preview
Recorded Link of class on man-in-the middle attack
Preview
What Is A Man-in-the-Middle Attack?
Preview
Formulation on Man-in-the Middle attack
Preview
Man-in-the-Middle Attacks - NS-video
Preview
Lecture 14: MAC ad Hash function
PowerPoint Slide chapter 11: MAC & Hash function
Preview
Trisha's Hand notes on- Chapter 11- MAC & Hash Function
Preview
Recorded Link of class on hash function
Preview
Message Authentication Code
Preview
Lecture 15: SHA Algorithm
PowerPoint Slide chapter 12: SHA Algorithms
Preview
NETWORK SECURITY - SHA 512 (AUTHENTICATION ALGORITHM)
Preview
NETWORK SECURITY - MD5 ALGORITHM
Preview
Lecture 16 : Digital signatures
PowerPoint Slide chapter 13: Digital signatures & Authentication Protocols
Preview
NETWORK SECURITY - DIGITAL SIGNATURE ALGORITHM (DSA)
Preview
Trisha's Hand notes on- Chapter 13: Digital Signature
Preview
Lecturer 17: Electronic Mail Security
PowerPoint Slide chapter 15: Electronic mail security
Preview
NETWORK SECURITY - PGP (E-MAIL SECURITY)
Preview
Trisha's Hand notes on- Chapter 15: Electronic mail security
Preview
NETWORK SECURITY - KERBEROS (AUTHENTICATION APPLICATION)
Preview
PGP Encryption
Preview
Lecture 18: IP Security
PowerPoint Slide chapter 15: IP Security
Preview
X.509 AUTHENTICATION SERVICE PART 2 - NETWORK SECURITY
Preview
NETWORK SECURITY - IP SECURITY PART 1 (AUTHENTICATION HEADER)
Preview
NETWORK SECURITY - IP SECURITY PART 2 (ENCAPSULATING SECURITY PAYLOAD)
Preview
Lecture 19: Firewall
PowerPoint Slide chapter 19: Firewall
Preview
How firewalls work | Network firewall security | firewall security | TechTerms
Preview
Firewalls and Network Security - Information Security
Preview
Firewall limitations - Software and Hardware - Disadvantages| Network Security | TechTerms
Preview
CHAPTER 12 FIREWALL Networking Basic
Preview
Skill Development
How to Design Cartoon Character in PowerPoint
Preview
Skill Development with GoEdu
Preview
Language Learning with DJIT
Preview
Share
×
Share on Social Networks
Share Link
Copy Text