2
|
Introduction to Classical Cryptography
|
3
|
The Threat Environment, Basic Security Terminology, Case Study: The Tjx Data Breach
|
4
|
The Threat Environment (cont...), Employee and Ex-Employee (Insider) Threats
|
5
|
Traditional External Attackers, Classic Malware: Viruses and Worms, Trojan Horses and Rootkits
|
6
|
Trojan Horses and Rootkits (cont...), Other Malware Attacks
|
7
|
Hackers, Social Engineering used by Hackers
|
8
|
Cryptography :Definitions & Concepts, Kerckhoff's Principle, Strength of the Cryptosystem, Services of Cryptosystems
|
Assignment No. 1 - Academic Research Paper - Open
9
|
Cryptography (cont...), One-Time Pad, Steganography, Types of Ciphers
|
10
|
Methods of Encryption, Symmetric Cryptography, Asymmetric Cryptography, Symmetric vs Asymmetric Algorithms
|
11
|
Symmetric Algorithms, Block Ciphers, Stream Ciphers, Hybrid Encryption Systems
|
12
|
Types of Symmetric Systems, Data Encryption Standard (DES)
|
Assignment No. 2
13
|
DES (cont...), Triple DES (3DES)
|
14
|
Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), Blowfish, RC4, RC5, RC6, Review of Cryptography
|
15
|
Asymmetric Key Algorithms, Diffie Hellman Algorithm, RSA Algorithm
|
16
|
Difference between Public Key Cryptography and Public Key Infrastructure (PKI), One-Way Functions, El Gamal, Elliptic Curve Cryptosystems, Knapsack
|
17
|
Message Integrity, Message Authentication Codes (MAC), HMAC Example, CBC-MAC
|
18
|
MAC (cont...), CMAC, Types of Hashing Algorithms, Desired Features of Cryptographic Hash Functions, Hashing Algorithms used Today
|
Mid-term Examination
19
|
Review of Symmetric Asymmetric and Hashing Algorithms, Digital Signatures, Digital Signature Standard (DSS), Public Key Infrastructure (PKI)
|
20
|
PKI (cont...), PKI Components, Certificate Authority (CA), Functions of a Certificate Authority, Certificate Revocation List (CRL)
|
Assignment No. 3
21
|
Online Certificate Status Protocol (OCSP), Certificates and X.509, Registration Authority (RA), PKI Example, PKI Components, PKI Security Services
|
22
|
Review of PKI Digital Certificates Certificate Structure and PKI Services, Key Management, Kerberos Protocol, Key Management Principles, Rules for Keys
|
23
|
Link Encryption vs End-to-End Encryption, Encryption at Different Layers, Hardware vs Software Cryptography Systems, Email Standards
|
24
|
Review of Link Encryption vs End-to-End Encryption, Email Standards (cont...)
|
25
|
Quantum Cryptography, Internet Security, Internet Protocols
|
26
|
Secure HTTP(S-HTTP), Secure Electronic Transaction (SET), Cookies and How They Work
|
27
|
Typical Cryptographic System Working, Secure Shell (SSH), Virtual Private Networks (VPNs), IPSEC (Internet Protocol Security)
|
28
|
IPSEC (cont...), Attacks: Passive and Active
|
29
|
Enterprise Network Architecture, Different Traffic Flows in the Enterprise, Implementing Security in the Enterprise
|
30
|
Enterprise Network Architecture (cont...)
|
Assignment No.1 - Academic Research Paper - Due
31
|
Enterprise Network Architecture (cont..)
|
32
|
Firewalls, Types of Firewalls
|
Course Viva GDB
33
|
Types of Firewalls (cont...), Firewall Configurations and Demilitarized Zone (DMZ), Distributed Firewalls
|
34
|
Enterprise Network Architecture (cont...), Intrusion Detection and Prevention System (IDPS)
|
Assignment No. 4 - Presentation on Research Paper
35
|
IPS Technologies, IPS Response Techniques, Common IPS Detection Methodologies
|
36
|
Common IPS Detection Methodologies (cont...), Stateful Protocol Analysis, Types of IDPS technologies
|
37
|
System and Server Security
|
38
|
System and Server Security (cont...)
|
39
|
Web Application Security, Open Web Application Security Project (OWASP)
|
40
|
OWASP (cont...), OWASP top 10, Secure SDLC
|
41
|
Information Security Assessments, Technical Assessment Techniques, Testing Viewpoints, Vulnerability Scanning
|
42
|
Target Vulnerability Validation Techniques, Penetration Testing Overview and Phases
|
43
|
Security Features on Switches, Layer 2 Security, Types of Layer 2 Attacks, Port Level Traffic Controls
|
44
|
Spanning Tree Protocol (STP) Features, Access Control Lists on Switches, Layer 2 Security Best Practices
|
45
|
Twenty Critical Security Controls, Award-winning Security Products
|
Final-term Examination
|