17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
Computer Network Security Protocols And Techniques (Updated 02/2021)
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English + srt | Duration: 56 lectures (3h 33m) | Size: 964.6 MB Public-Private Key Cryptography, Hash Functions, End Point Authentication, TLS/SSL, IPsec in VPNs, Integrity Protection What you'll learn: Computer Network security Alogorithms Symmetric And Asymmetric Key Cryptography Traditional And Modern Ciphers Message Authentication/Integrity Protection Hash Functions RSA And diffie hellman Key Exchange Algorithms End Point Authentication E-mail security Protocol Transport Layer Security (TLS) Secure Socket Layer (SSL) IPsec for virtual private networks
Requirements Familiarity With Basic Computer Network Concepts
Description The aim of this course is to introduce the student to the area of computer Network Security. This course develops a basic understanding of the algorithms used to protect the flow of information in Computer networks and to understand some of the design choices behind these algorithms.
The content of this course are as follows:
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction/1. What is Computer Network Security.mp4
16.5 MB
~Get Your Files Here !/1. Introduction/1. What is Computer Network Security.srt
2.7 KB
~Get Your Files Here !/1. Introduction/2. Friends And Enemies Alice, Bob and Eve.mp4
22.1 MB
~Get Your Files Here !/1. Introduction/2. Friends And Enemies Alice, Bob and Eve.srt
4.1 KB
~Get Your Files Here !/10. Firewalls/1. What is Firewall.mp4
20.7 MB
~Get Your Files Here !/10. Firewalls/1. What is Firewall.srt
3.1 KB
~Get Your Files Here !/10. Firewalls/2. Why Firewalls are used.mp4
19.1 MB
~Get Your Files Here !/10. Firewalls/2. Why Firewalls are used.srt
2.2 KB
~Get Your Files Here !/10. Firewalls/3. Types of Firewalls 1) Stateless Packet Filtering.mp4
51.1 MB
~Get Your Files Here !/10. Firewalls/3. Types of Firewalls 1) Stateless Packet Filtering.srt
7.1 KB
~Get Your Files Here !/10. Firewalls/4. Network Security Policy For Packet Filtering.mp4
53.5 MB
~Get Your Files Here !/10. Firewalls/4. Network Security Policy For Packet Filtering.srt
6.3 KB
~Get Your Files Here !/10. Firewalls/5. Stateless Packet Filtering Implementation as Access Control List.mp4
37.7 MB
~Get Your Files Here !/10. Firewalls/5. Stateless Packet Filtering Implementation as Access Control List.srt
5.4 KB
~Get Your Files Here !/10. Firewalls/6. Drawback Of Stateless Packet Filtering.mp4
23.8 MB
~Get Your Files Here !/10. Firewalls/6. Drawback Of Stateless Packet Filtering.srt
3 KB
~Get Your Files Here !/10. Firewalls/7. 2) Stateful Packet Filtering.mp4
11.9 MB
~Get Your Files Here !/10. Firewalls/7. 2) Stateful Packet Filtering.srt
1.8 KB
~Get Your Files Here !/10. Firewalls/8. Stateful Packet Filtering Implementation in Access Control List.mp4
9.7 MB
~Get Your Files Here !/10. Firewalls/8. Stateful Packet Filtering Implementation in Access Control List.srt
1.5 KB
~Get Your Files Here !/10. Firewalls/9. 3) Application Gateways.mp4
21.1 MB
~Get Your Files Here !/10. Firewalls/9. 3) Application Gateways.srt
2.8 KB
~Get Your Files Here !/2. Principles Of Cryptography/1. The Terminologies Of Cryptography.mp4
7.3 MB
~Get Your Files Here !/2. Principles Of Cryptography/1. The Terminologies Of Cryptography.srt
1.2 KB
~Get Your Files Here !/2. Principles Of Cryptography/2. Two Domains Of Cryptography-Symmetric Key Cryptography & Public Key Cryptography.mp4
6 MB
~Get Your Files Here !/2. Principles Of Cryptography/2. Two Domains Of Cryptography-Symmetric Key Cryptography & Public Key Cryptography.srt
3 KB
~Get Your Files Here !/2. Principles Of Cryptography/3. Traditional Ciphers and its Types.mp4
25.1 MB
~Get Your Files Here !/2. Principles Of Cryptography/3. Traditional Ciphers and its Types.srt
5.7 KB
~Get Your Files Here !/2. Principles Of Cryptography/4. Example Of Shift Cipher-Caesar Cipher.mp4
20.5 MB
~Get Your Files Here !/2. Principles Of Cryptography/4. Example Of Shift Cipher-Caesar Cipher.srt
3.9 KB
~Get Your Files Here !/2. Principles Of Cryptography/5. Example of Transposition Cipher.mp4
15.8 MB
~Get Your Files Here !/2. Principles Of Cryptography/5. Example of Transposition Cipher.srt
2.6 KB
~Get Your Files Here !/3. The Modern Ciphers/1. The Modern Ciphers.mp4
29.6 MB
~Get Your Files Here !/3. The Modern Ciphers/1. The Modern Ciphers.srt
7.4 KB
~Get Your Files Here !/3. The Modern Ciphers/2. Modern round ciphers DES and triple DES.mp4
45.1 MB
~Get Your Files Here !/3. The Modern Ciphers/2. Modern round ciphers DES and triple DES.srt
9.1 KB
~Get Your Files Here !/3. The Modern Ciphers/3. Modern Round Ciphers Advanced Encryption Standard (AES).mp4
8.5 MB
~Get Your Files Here !/3. The Modern Ciphers/3. Modern Round Ciphers Advanced Encryption Standard (AES).srt
1.7 KB
~Get Your Files Here !/3. The Modern Ciphers/4. Modes of Operation for block cipher ECB, CBC,CFB, OFB.mp4
36.2 MB
~Get Your Files Here !/3. The Modern Ciphers/4. Modes of Operation for block cipher ECB, CBC,CFB, OFB.srt
8.5 KB
~Get Your Files Here !/4. Asymmetric key cryptography/1. Rivest, Shamir, Adleman (RSA) Algorithm.mp4
43.8 MB
~Get Your Files Here !/4. Asymmetric key cryptography/1. Rivest, Shamir, Adleman (RSA) Algorithm.srt
8.6 KB
~Get Your Files Here !/4. Asymmetric key cryptography/2. Diffie-Hellman Key Exchange Algorithm.mp4
17.6 MB
~Get Your Files Here !/4. Asymmetric key cryptography/2. Diffie-Hellman Key Exchange Algorithm.srt
4.2 KB
~Get Your Files Here !/4. Asymmetric key cryptography/3. Diffie-Hellman Idea and Man In The Middle Attack.mp4
18.3 MB
~Get Your Files Here !/4. Asymmetric key cryptography/3. Diffie-Hellman Idea and Man In The Middle Attack.srt
3.9 KB
~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/1. Message Authentication-Integrity Protection Using Digital Signatures.mp4
33.3 MB
~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/1. Message Authentication-Integrity Protection Using Digital Signatures.srt
5.9 KB
~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/2. Hash Functions-MD5 and SHA-1.mp4
12.2 MB
~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/2. Hash Functions-MD5 and SHA-1.srt
2.4 KB
~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/3. Role Of Certification Authorities in Public Key Encryption.mp4
15.6 MB
~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/3. Role Of Certification Authorities in Public Key Encryption.srt
3 KB
~Get Your Files Here !/6. End Point Authentication/1. End Point Authentication Scenarios to avoid man in the middle attack.mp4
54.9 MB
~Get Your Files Here !/6. End Point Authentication/1. End Point Authentication Scenarios to avoid man in the middle attack.srt
10.1 KB
~Get Your Files Here !/7. Securing The E-mail/1. Mechanism to secure e-mail.mp4
29.4 MB
~Get Your Files Here !/7. Securing The E-mail/1. Mechanism to secure e-mail.srt
5.2 KB
~Get Your Files Here !/7. Securing The E-mail/2. Pretty Good Privacy (PGP) to secure e-mail.mp4
6.2 MB
~Get Your Files Here !/7. Securing The E-mail/2. Pretty Good Privacy (PGP) to secure e-mail.srt
2.8 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/1. Introduction to Transport Layer Security (TLS).mp4
8.7 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/1. Introduction to Transport Layer Security (TLS).srt
1.8 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/10. Actual TLS-SSL Cipher Suite.mp4
23.2 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/10. Actual TLS-SSL Cipher Suite.srt
3.6 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/11. Four protocols used in actual TLS.mp4
16.6 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/11. Four protocols used in actual TLS.srt
2.4 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/12. Handshake in Actual TLS.mp4
17.9 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/12. Handshake in Actual TLS.srt
3.3 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/13. Actual TLS Record Protocol.mp4
12.9 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/13. Actual TLS Record Protocol.srt
3.2 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/14. Actual TLS Flow Diagram.mp4
25.9 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/14. Actual TLS Flow Diagram.srt
5.9 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/2. TLS Security Services (TLS) Services.mp4
6.8 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/2. TLS Security Services (TLS) Services.srt
2.1 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/3. The bigger picture-Toy TLSSSL Example.mp4
12.9 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/3. The bigger picture-Toy TLSSSL Example.srt
2.1 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/4. Toy TLS-Handshake and key derivation.mp4
9.4 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/4. Toy TLS-Handshake and key derivation.srt
2.3 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/5. Toy TLS-Data Transfer Using Data Records.mp4
13.9 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/5. Toy TLS-Data Transfer Using Data Records.srt
2.4 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/6. Toy TLS-Sequence Number To Prevent Replay Attack.mp4
32.2 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/6. Toy TLS-Sequence Number To Prevent Replay Attack.srt
5.4 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/7. Toy TLS-Control Information In Header.mp4
31.1 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/7. Toy TLS-Control Information In Header.srt
5 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/8. Toy TLS-Summary.mp4
19.8 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/8. Toy TLS-Summary.srt
4.4 KB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/9. Toy TLS Is Not Complete.mp4
5.6 MB
~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/9. Toy TLS Is Not Complete.srt
1.2 KB
~Get Your Files Here !/9. Virtual Private Networks/1. Introduction To Virtual Private Networks (VPNs).mp4
16.7 MB
~Get Your Files Here !/9. Virtual Private Networks/1. Introduction To Virtual Private Networks (VPNs).srt
2.4 KB
~Get Your Files Here !/9. Virtual Private Networks/10. Transport Versus Tunnel Mode.mp4
11.3 MB
~Get Your Files Here !/9. Virtual Private Networks/10. Transport Versus Tunnel Mode.srt
1.7 KB
~Get Your Files Here !/9. Virtual Private Networks/11. Authentication Header (AH) Protocol.mp4
16.7 MB
~Get Your Files Here !/9. Virtual Private Networks/11. Authentication Header (AH) Protocol.srt
2.2 KB
~Get Your Files Here !/9. Virtual Private Networks/12. Encapsulating Security Payload (ESP).mp4
17.8 MB
~Get Your Files Here !/9. Virtual Private Networks/12. Encapsulating Security Payload (ESP).srt
2.2 KB
~Get Your Files Here !/9. Virtual Private Networks/13. Four Modes Of IPsec.mp4
3 MB
~Get Your Files Here !/9. Virtual Private Networks/13. Four Modes Of IPsec.srt
992 B
~Get Your Files Here !/9. Virtual Private Networks/2. IPsec Protocol in VPNs.mp4
22.7 MB
~Get Your Files Here !/9. Virtual Private Networks/2. IPsec Protocol in VPNs.srt