The aim of this course is to introduce the student to the area of computer Network Security. This course develops a basic understanding of the algorithms used to protect the flow of information in Computer networks and to understand some of the design choices behind these algorithms.
The content of this course are as follows:
Section 1: Introduction
What is Computer Network Security?
Friends And Enemies: Alice, Bob and Eve
Section 2: Principles Of Cryptography
The Terminologies Of Cryptography
Two Domains Of Cryptography-Symmetric Key Cryptography & Public Key Cryptography
Traditional Ciphers and its Types
Example Of Shift Cipher-Caesar Cipher
Example of Transposition Cipher
Section 3: The Modern Ciphers
DES and Triple DES
Advanced Encryption Standard (AES)
Modes of Operation for block cipher: ECB, CBC,CFB, OFB
Section 4: Asymmetric key cryptography
Rivest, Shamir, Adleman (RSA) Algorithm
Diffie-Hellman Key Exchange Algorithm
Man In The Middle Attack
Section 5: Message Authentication-Integrity Protection Using Digital Signatures
Hash Functions-MD5 and SHA-1
Role Of Certification Authorities in Public Key Encryption
Section 6: End Point Authentication Scenarios to avoid man in the middle attack
Section 7: Securing The E-mail
Pretty Good Privacy (PGP) to secure e-mail
Section 8: Transport Layer Security Using TLS/SSL
TLS Security Services (TLS) Services
The bigger picture-Toy TLS/SSL Example
Actual TLS-SSL Cipher Suite
Protocols used in actual TLS
Handshake in Actual TLS
Actual TLS Record Protocol
Actual TLS Flow Diagram
Section 9: Virtual Private Networks
IPsec Protocol in VPNs
IPsec Security Services
IPSec Framework
IPSec Security Association
Internet Key Exchange (IKE): IKE Phase 1, IKE Phase 2
Authentication Header (AH) Vs Encapsulating Security Payload (ESP)
Transport Versus Tunnel Mode
Authentication Header (AH) Protocol
Encapsulating Security Payload (ESP)
Four Modes Of IPsec
Central Hub
Gather all your networking courses in one organized platform.
Professional Proof
Build an online resume that showcases your skills instantly.
Global Community
Connect with learners worldwide and share insights.
Continuous Growth
Keep learning seamlessly, whenever and wherever.
Organized Learning
Customize your environment to stay focused and clutter-free.
Transformative change
Gain knowledge and skills that reshape your path forward.
Atenea Learning is a centralized platform that helps you organize, access, and succeed in networking courses, with community interactions and tools for professional growth.
There are over 200 networking and professional-development courses ready to enroll.
Yes! You can create a professional online resume to showcase your skills and experience.
Definitely. You’ll be able to interact socially with other learners around the world.
Yes, learning is designed to be continuous and accessible at your convenience, so you can grow at your own pace.
Absolutely. Atenea allows you to organize and tailor your learning environment according to your preferences.
It’s ideal for anyone wanting to advance in networking, build professional credentials, and join a global community of learners.
19,99 €
Public-Private Key Cryptography, Hash Functions, End Point Authentication, TLS/SSL, IPsec in VPNs, Integrity Protection