Home
Events
Forum
Courses
Application
Contact us
Career
Wiki
Exam Status
Sign in
Contact Us
Courses
Computer and Network Security
Class Recorded on Conducted Quiz 1
Nav
Home
└
Computer and Network Security
└
Class Recorded on Conducted Quiz 1
Computer and Network Security
0 %
Course content
Lecture 1
Course Synopsis of Computer and Network security
Refereed e-Book of Computer and Network security
Refereed e-Book of Computer and Network security
Syllabus of Computer and Network Security
Previous NU Board question of Network security
Previous NU Board question of Network security
PowerPoint Slide of Chapter 1: Introduction
PowerPoint Slide of Chapter 1: Introduction
NETWORK SECURITY - BASIC CONCEPTS
Tahmina Aktar Trisha-DIIT- Security Goals and Threats
Network Security Demonstrate by--Cisco
Network Security Demonstrate by--Cisco
Recent Network Security Articles
Recent Network Security Articles
Lecture 2 : Network Security and Access model
PowerPoint Slide of Chapter 1: Network security model
PowerPoint Slide of Chapter 1: Network security model
Network Security Model Explained Easily
Quiz 1: Chapter 1
Trisha's Hand notes on- Chapter 1- Introduction
Trisha's Hand notes on- Chapter 1- Introduction
Sample Mid Term Question- Network Security
Tahmina Aktar Trisha-DIIT- Network Security- Active and Passive attacks
Video on Security Attacks
Video on Security Attacks
Class Recorded on Conducted Quiz 1
Class Recorded on Conducted Quiz 1
Lecture 3 : Cryptography
PowerPoint Slide of Chapter : 2 Cryptography
PowerPoint Slide of Chapter : 2 Cryptography
Public Key Cryptography - Computerphile
Symmetric Key and Public Key Encryption
Trisha's- Hand notes on- Chapter 2- Classical Encryption Technique
Trisha's- Hand notes on- Chapter 2- Classical Encryption Technique
Research on Unshared Secret Key Cryptography
Research on Unshared Secret Key Cryptography
Lecture 4: Poly alphabetic, Mono Alphabetic, Hill Ciphers
PowerPoint Slide of Chapter : 2 Cryptography
PowerPoint Slide of Chapter : 2 Cryptography
Polyalphabetic Substitution Cipher explained step by step with example !!!
Playfair Cipher || Network Security in Bangla || How to convert Plaintext into Cipher text in bangla
hill cipher decryption 3×3 matrix
One time pad Cipher (Vernam Cipher)
Trisha's- Hand notes on- Chapter 2- Ciphers
Trisha's- Hand notes on- Chapter 2- Ciphers
Lecture 5: Block Ciphers and Encryption standard method
PowerPoint slide of Chapter 3: Block Cipher and DES
PowerPoint slide of Chapter 3: Block Cipher and DES
Quiz 2: Chapter 2
Quiz 2: Chapter 2
NETWORK SECURITY - DES (DATA ENCRYPTION STANDARD) ALGORITHM
Feistel Cipher - Computerphile
Published Research on DES
Published Research on DES
Trisha's Hand notes on- Chapter 3- Block cipher & Data encryption standard
Trisha's Hand notes on- Chapter 3- Block cipher & Data encryption standard
Class Recorded on Conducted Quiz 2
Class Recorded on Conducted Quiz 2
NETWORK SECURITY - FEISTEL STRUCTURE
DES encryption animation and example part 4(DES)
Lecture 6: Double DES
Recorded Link of Class on Double DES
Recorded Link of Class on Double DES
PowerPoint slide of Chapter 6: Double DES
PowerPoint slide of Chapter 6: Double DES
S Box (Substitution Box)
S-Box Theory
Trisha's Hand notes on- Chapter 6- More on Symmetric ciphers
Trisha's Hand notes on- Chapter 6- More on Symmetric ciphers
Recorded Link of Conducted demo Quiz
Recorded Link of Conducted demo Quiz
Lecture 7: Block cipher modes of operation
PowerPoint Slide of Chapter 6: Block Cipher Modes
PowerPoint Slide of Chapter 6: Block Cipher Modes
NETWORK SECURITY - BLOCK CIPHER MODES OF OPERATION
Research on Block Cipher modes
Research on Block Cipher modes
Recorded Link of Class on Block Cipher Modes of operation
Class on Block Cipher modes of operation
Trisha's Hand notes on- Chapter 6- Block ciphers Modes
Trisha's Hand notes on- Chapter 6- Block ciphers Modes
Lecture 8: Confidentiality using Symmetric Encryption
PowerPoint Slide of Chapter 7: Confidentiality using symmetric Encryption
PowerPoint Slide of Chapter 7: Confidentiality using symmetric Encryption
Session Keys
Recorded Link of Class on Link & end-to-end encryption
Recorded Link of Class on Link & end-to-end encryption
Link encryption vs. End to end encryption
Trisha's Hand notes on- Chapter 7- Confidentiality using symmetric encryption
Trisha's Hand notes on- Chapter 7- Confidentiality using symmetric encryption
Lecture 9: Key Distribution scenario
PowerPoint Slide of Chapter 7: Key distribution Scenario
PowerPoint Slide of Chapter 7: Key distribution Scenario
NETWORK SECURITY - PUBLIC KEY DISTRIBUTION
Trisha's Hand notes on- Chapter 7- Public Key Distribution
Trisha's Hand notes on- Chapter 7- Public Key Distribution
Wireless Authentication and Key Generation
Recorded Link of class on key distribution
Recorded Link of class on key distribution
Research on Key distribution
Research on Key distribution
Lecture 10: RSA Algorithm
PowerPoint Slide of Chapter 9: Public Key cryptography & RSA
PowerPoint Slide of Chapter 9: Public Key cryptography & RSA
The Practice of RSA Algorithm
NETWORK SECURITY - RSA ALGORITHM
Trisha's Hand notes on- Chapter 9- Public Key cryptography & RSA
Trisha's Hand notes on- Chapter 9- Public Key cryptography & RSA
Assignment on RSA Algorithm
Assignment on RSA Algorithm
Recorded Link of Class on RSA Algorithm
Recorded Link of Class on RSA Algorithm
Research Article on RSA Algorithm
Lecture 11: Key Management
PowerPoint Slide of Chapter 10: Key Management
PowerPoint Slide of Chapter 10: Key Management
Public Key Distribution - Public Key Authority and Public Key Certificate
Recorded Link of Class on public key authority
Recorded Link of Class on public key authority
Trisha's Hand notes on- Chapter 10- Key Management Document
Trisha's Hand notes on- Chapter 10- Key Management Document
X.509 AUTHENTICATION SERVICE PART 1 - NETWORK SECURITY
Research on Digital signature
The Key authority - secure key management
The Key authority - secure key management
Lecture 12: Diffie Hellman Key exchange algorithm
PowerPoint Slide chapter 10: Diffie Hellman Algorithm
PowerPoint Slide chapter 10: Diffie Hellman Algorithm
Trisha's Hand notes on- Chapter 10- Diffie Hellman Algorithm
Trisha's Hand notes on- Chapter 10- Diffie Hellman Algorithm
Research article on Diffie Hellman Algorithm
Research article on Diffie Hellman Algorithm
Recorded Link of Class on Diffie Hellman Algorithm
Recorded Link of Class on Diffie Hellman Algorithm
NETWORK SECURITY - DIFFIE HELLMAN KEY EXCHANGE ALGORITHM
Mathematical Practice on Diffie Hellman Key Exchange Algorithm
Assignment on Diffie Hellman key exchange algorithm
Lecture 13: Man in the Middle attack
NETWORK SECURITY - TYPES OF AUTHENTICATION (Message Encryption, MAC, Hash Functions)
PowerPoint Slide chapter 10: Man in the Middle attack
PowerPoint Slide chapter 10: Man in the Middle attack
Recorded Link of class on man-in-the middle attack
Recorded Link of class on man-in-the middle attack
What Is A Man-in-the-Middle Attack?
Formulation on Man-in-the Middle attack
Man-in-the-Middle Attacks - NS-video
Lecture 14: MAC ad Hash function
PowerPoint Slide chapter 11: MAC & Hash function
PowerPoint Slide chapter 11: MAC & Hash function
Trisha's Hand notes on- Chapter 11- MAC & Hash Function
Trisha's Hand notes on- Chapter 11- MAC & Hash Function
Recorded Link of class on hash function
Recorded Link of class on hash function
Message Authentication Code
Message Authentication Code
Lecture 15: SHA Algorithm
PowerPoint Slide chapter 12: SHA Algorithms
PowerPoint Slide chapter 12: SHA Algorithms
NETWORK SECURITY - SHA 512 (AUTHENTICATION ALGORITHM)
NETWORK SECURITY - MD5 ALGORITHM
Lecture 16 : Digital signatures
PowerPoint Slide chapter 13: Digital signatures & Authentication Protocols
PowerPoint Slide chapter 13: Digital signatures & Authentication Protocols
NETWORK SECURITY - DIGITAL SIGNATURE ALGORITHM (DSA)
Trisha's Hand notes on- Chapter 13: Digital Signature
Trisha's Hand notes on- Chapter 13: Digital Signature
Lecturer 17: Electronic Mail Security
PowerPoint Slide chapter 15: Electronic mail security
PowerPoint Slide chapter 15: Electronic mail security
NETWORK SECURITY - PGP (E-MAIL SECURITY)
Trisha's Hand notes on- Chapter 15: Electronic mail security
Trisha's Hand notes on- Chapter 15: Electronic mail security
NETWORK SECURITY - KERBEROS (AUTHENTICATION APPLICATION)
PGP Encryption
PGP Encryption
Lecture 18: IP Security
PowerPoint Slide chapter 15: IP Security
PowerPoint Slide chapter 15: IP Security
X.509 AUTHENTICATION SERVICE PART 2 - NETWORK SECURITY
NETWORK SECURITY - IP SECURITY PART 1 (AUTHENTICATION HEADER)
NETWORK SECURITY - IP SECURITY PART 2 (ENCAPSULATING SECURITY PAYLOAD)
Lecture 19: Firewall
PowerPoint Slide chapter 19: Firewall
PowerPoint Slide chapter 19: Firewall
How firewalls work | Network firewall security | firewall security | TechTerms
Firewalls and Network Security - Information Security
Firewall limitations - Software and Hardware - Disadvantages| Network Security | TechTerms
CHAPTER 12 FIREWALL Networking Basic
Skill Development
How to Design Cartoon Character in PowerPoint
Skill Development with GoEdu
Employability Skills [Part 1]: Improve Job Opportunities
Thinking in Object Oriented Programming: Basic Concept
Career Planning from News Media: Advanced Techniques
Creative Graphic Design and Freelancing
Language Learning with DJIT
Language Learning with DJIT
Class Recorded on Conducted Quiz 1
Prev
Set Done
Next
Fullscreen
About
Comments (
0
)
Statistics
Share
Class Recorded on Conducted Quiz 1
Views
0
Total Views
0
Members Views
0
Public Views
Actions
0
Likes
0
Dislikes
0
Comments
Share on Social Networks
Share Link
Copy Text
Share by mail
Please
login
to share this document by email.
External sources
Class Recorded on Conducted Quiz 1