BCA Semester IV - Network Security
Network Security
IT and Software ,Network and Security,Network Security
Lectures -36
Quizzes -3
Duration -4 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
UNIT I Cryptography Terminology:
- Stenography, Subscription ciphers, one-time patios,
- Cryptographic Protocols-Introduction using Symmetric Cryptography, one-way Hash Functions, communication using public-key cryptography and hybrid cryptosystems, Digital Signatures,
- Digital Signatures with encryption, Random and pseudo-random sequence generation,
- Basic protocols- key Exchange, authentication and key exchange, formal analysis,
- secret splitting, secret sharing, and cryptographic protection of databases.
UNIT-II Key Length-symmetric key length:
- Key Management Generation transfer, verification use, Store Backup, lifetime, destruction, and public key management.
- Algorithm types and modes-Electronic codebook, Black replay, Cipher Block clouding, Stream
- Ciphers, self-synchronizing, cipher-feedback, synchronous stream, output feedback, counter mode, choosing cipher mode, comparison
- Using Algorithms-choosing an algorithm, public key versus symmetric encrypting and
- communication channels. Encrypting data for storage hardware encryption versus software
- Encryption
UNIT-III Digital Signature Algorithm
Prerequisites
No Prior Knowledge is Required

Curriculum
Check out the detailed breakdown of what’s inside the course
Cryptography
23 Lectures
-
Course Introduction 00:47 00:47
-
Introduction to Information Security 03:47 03:47
-
Difference between all the Security Disciplines 04:50 04:50
-
Course Resources
-
The CIA triad questionnaire
-
The CIA Triad 11:17 11:17
-
Other Important InfoSec Concepts 10:47 10:47
-
Authentication and Authorization 04:27 04:27
-
Cryptography 08:13 08:13
-
Risk, Threat, Vulnerability 04:02 04:02
-
Basic infosec concepts questionnaire
-
Security Governance 04:37 04:37
-
Security Policies 05:56 05:56
-
Security Auditing 02:37 02:37
-
Risk Management 02:16 02:16
-
Laws and Regulations 04:19 04:19
-
Application Security 05:12 05:12
-
Security Governance Questionnaire
-
Introduction to Hacking 04:12 04:12
-
Phishing 06:04 06:04
-
DDoS 05:19 05:19
-
Viruses, Worms, Malware 06:03 06:03
-
SQL Injection 05:39 05:39
Unit 2- Key Management, Algorithm types and modes
12 Lectures

Unit 3-Digital Signature Algorithm
1 Lectures

Instructor Details

Tutorialspoint
Simple and Easy Learning
Tutorials Point originated from the idea that there exists a class of readers who respond better to online content and prefer to learn new skills at their own pace from the comforts of their drawing rooms.
The journey commenced with a single tutorial on HTML in 2006 and elated by the response it generated, we worked our way to adding fresh tutorials to our repository which now proudly flaunts a wealth of tutorials and allied articles on topics ranging from programming languages to web designing to academics and much more.
40 million readers read 100 million pages every month
Our Text Library Content and resources are freely available and we prefer to keep it that way to encourage our readers acquire as many skills as they would like to. We don't force our readers to sign up with us or submit their details either to use our Free Text Tutorials Library. No preconditions and no impediments, Just Simply Easy Learning!
We have established a Digital Content Marketplace to sell Video Courses and eBooks at a very nominal cost. You will have to register with us to avail these premium services.
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now