Information Security (IS) Materials ...(Download Link)
Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services
(Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and
Mechanisms, A model for Internetwork security, Internet Standards and RFCs, Buffer overflow & format
string vulnerabilities, TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and
man-in-the-middle attacks.
Conventional Encryption Principles, Conventional encryption algorithms, cipher block modes of operation,
location of encryption devices, key distribution Approaches of Message Authentication, Secure Hash
Functions and HMAC.
Public key cryptography principles, public key cryptography algorithms, digital signatures, digital
Certificates, Certificate Authority and key management Kerberos, X.509 Directory Authentication Service.
Email privacy: Pretty Good Privacy (PGP) and S/MIME.
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload,
Combining Security Associations and Key Management.
Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure
Electronic Transaction (SET).
Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3.
Intruders, Viruses and related threats.
Firewall Design principles, Trusted Systems. Intrusion Detection Systems.
Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services
(Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and
Mechanisms, A model for Internetwork security, Internet Standards and RFCs, Buffer overflow & format
string vulnerabilities, TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and
man-in-the-middle attacks.
Conventional Encryption Principles, Conventional encryption algorithms, cipher block modes of operation,
location of encryption devices, key distribution Approaches of Message Authentication, Secure Hash
Functions and HMAC.
Public key cryptography principles, public key cryptography algorithms, digital signatures, digital
Certificates, Certificate Authority and key management Kerberos, X.509 Directory Authentication Service.
Email privacy: Pretty Good Privacy (PGP) and S/MIME.
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload,
Combining Security Associations and Key Management.
Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure
Electronic Transaction (SET).
Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3.
Intruders, Viruses and related threats.
Firewall Design principles, Trusted Systems. Intrusion Detection Systems.