Network management and security
Network Management and Security
Network Management and Security
Network Management and Security
Network Management and Security
Network Management and Security
Network Management and Security
- Introduction to Network security
- Security attacks
- Active and Passive attacks
- Security Services
- Security Mechanisms
- A Model Of Inter Network Security
- Internet Standards
- Internet Standards and RFC
- Buffer Overflow
- Format String Vulnerability
- Session Hijacking
- UDP Session Hijacking
- Route Table Modification
- Address resolution protocol attacks
- Man-in-the-middle attack
- Conventional Encryption principles
- Cryptography
- Cryptanalysis
- Substitution Encryption Techniques
- Playfair Ciphers
- Hill Cipher
- Polyalphabetic Ciphers
- Pigpen Cipher
- Transposition techniques
- Feistel Cipher Structure
- Feistel Cipher Decryption
- Conventional Encryption Algorithms
- S-DES key generation
- S-DES Encryption
- Data Encryption Standard
- Single round of DES algorithm
- Triple Data Encryption Standard
- International Data Encryption Standard
- Blowfish Algorithm
- Blowfish Encryption Decryption
- Advanced encryption standard
- S-AES Encryption and Decryption
- S-AES key expansion
- The AES Cipher
- Substitute Bytes Transformation
- ShiftRows Transformation
- MixColumns Transformation
- AddRoundKey Transformation
- AES Key Expansion
- AES Decryption
- Cipher Block modes of Operation
- Cipher Block Chaining Mode
- Cipher Feed Back Mode
- Output Feedback Mode
- Counter Mode
- Message authentication
- Message Authentication Code
- Message Authentication Code Based on DES
- Hash function
- MD5 Message Digest Algorithm
- MD5 Compression Function
- Secure Hash Algorithm
- RIPEMD-160
- HMAC
- Public key Cryptography
- Attack on Public-key Cryptography
- Applications for public-key cryptosystems
- RSA algorithm
- Fermat's and Euler's theorem
- Security of RSA
- Key Management
- Public-key authority
- Public-key certificates
- Public Key Distribution of Secret Keys
- Diffie-Hellman key exchange
- Man-in-the-Middle Attack on Deffie-Hellman protocol
- Elliptic curve cryptography
- Cryptography with Elliptic Curves
- Digital Signature
- Digital Signature Standard
- Kerberos
- Kerberos Version 4 Authentication Dialogue
- Overview of Kerberos
- Kerberos Realms
- Kerberos version 5
- X.509 Authentication Service
- Authentication Procedures
- X.509 Version 3
- Pretty Good Privacy
- Pretty good privacy Operation
- Cryptographic Keys and Key Rings
- PGP Message Format
- PGP Key Rings
- PGP Message Transmission and Reception
- Public Key Management
- The Use of Trust
- Operation of Trust Processing
- PGP “Web of Trustâ€Â
- S/MIME
- MIME Content Types
- MIME Transfer Encodings
- MIME canonical form
- S/MIME Functionality
- S/MIME Messages
- S/MIME Certificate Processing
- Radix-64 Conversion
- IP Security Overview
- Applications of IPSec
- Benefits of IPSec
- IP Security Architecture
- Security Associations
- IPSec Authentication Header
- Anti-Replay Service
- Integrity Check Value
- Transport and Tunnel Modes
- Encapsulating Security Payload
- Transport Mode ESP
- Tunnel Mode ESP
- Combining Security Associations
- Key Management
- Oakley Key Determination Protocol
- Aggressive Oakley Key Exchange
- ISKAMP
- ISAKMP Payload Types
- ISAKMP Payload Types
- ISAKMP Exchanges
- Network Management
- Network Management Model
- Organization Model
- Information Model
- Communication Model
- Simple Network Management Protocol
- Functionality of SNMP
- Benefits of SNMP