Cryptography And Network Security

(CryptoSec.AB1.E1)/ISBN:978-1-64459-188-8

This course includes
Lessons
TestPrep
Hands-On Labs
AI Tutor (Add-on)

The Cryptography And Network Security course helps you explore the history and evolution of cryptographic techniques, including symmetric-key and public-key algorithms, hash functions, and digital signatures. The course delves into the mechanisms for secure communication over computer networks, including authentication, access control, and secure protocols such as SSL/TLS and IPsec. Additionally, you will gain an understanding of network security threats, including malware, denial-of-service attacks, and intrusion detection/prevention systems. 

Lessons

28+ Lessons | 130+ Quizzes | 201+ Flashcards | 201+ Glossary of terms

TestPrep

60+ Pre Assessment Questions | 2+ Full Length Tests | 60+ Post Assessment Questions | 120+ Practice Test Questions

Hands-On Labs

33+ LiveLab | 32+ Video tutorials | 44+ Minutes

Here's what you will learn

Download Course Outline

Lessons 1: Information and Network Security Concepts

  • Cybersecurity, Information Security, and Network Security
  • The OSI Security Architecture
  • Security Attacks
  • Security Services
  • Security Mechanisms
  •  Cryptography
  • Network Security
  • Trust and Trustworthiness
  • Standards

Lessons 2: Introduction to Number Theory

  • Divisibility and The Division Algorithm
  • The Euclidean Algorithm
  • Modular Arithmetic
  • Prime Numbers4
  • Fermat’s and Euler’s Theorems
  • Testing for Primality
  • The Chinese Remainder Theorem
  • Discrete Logarithms
  • Appendix 2A: The Meaning of Mod

Lessons 3: Classical Encryption Techniques

  • Symmetric Cipher Model
  • Substitution Techniques
  • Transposition Techniques

Lessons 4: Block Ciphers and the Data Encryption Standard

  • Traditional Block Cipher Structure
  • The Data Encryption Standard
  • A DES Example
  • The Strength of DES
  • Block Cipher Design Principles

Lessons 5: Finite Fields

  • Groups
  • Rings
  • Fields
  • Finite Fields of the Form GF(p)
  • Polynomial Arithmetic
  • Finite Fields of the Form GF (2n)

Lessons 6: Advanced Encryption Standard

  • Finite Field Arithmetic
  • AES Structure
  • AES Transformation Functions
  • AES Key Expansion
  • An AES Example
  • AES Implementation
  • Appendix 6A: Polynomials with Coefficients in GF(28)

Lessons 7: Block Cipher Operation

  • Multiple Encryption and Triple DES
  • Electronic CodeBook
  • Cipher Block Chaining Mode
  • Cipher Feedback Mode
  • Output Feedback Mode
  • Counter Mode
  • XTS-AES Mode for Block-Oriented Storage Devices
  • Format-Preserving Encryption

Lessons 8: Random Bit Generation and Stream Ciphers

  • Principles of Pseudorandom Number Generation
  • Pseudorandom Number Generators
  • Pseudorandom Number Generation Using a Block Cipher
  • Stream Ciphers
  • RC4
  • Stream Ciphers Using Feedback Shift Registers
  • True Random Number Generators

Lessons 9: Public-Key Cryptography and RSA

  • Principles of Public-Key Cryptosystems
  • The RSA Algorithm

Lessons 10: Other Public-Key Cryptosystems

  • Diffie–Hellman Key Exchange
  • Elgamal Cryptographic System
  • Elliptic Curve Arithmetic
  • Elliptic Curve Cryptography

Lessons 11: Cryptographic Hash Functions

  • Applications of Cryptographic Hash Functions
  • Two Simple Hash Functions
  • Requirements and Security
  • Secure Hash Algorithm (SHA)
  • SHA-3

Lessons 12: Message Authentication Codes

  • Message Authentication Requirements
  • Message Authentication Functions
  • Requirements for Message Authentication Codes
  • Security of MACs
  • MACs Based on Hash Functions: HMAC
  • MACs Based on Block Ciphers: DAA and CMAC
  • Authenticated Encryption: CCM and GCM
  • Key Wrapping
  • Pseudorandom Number Generation Using Hash Functions and MACs

Lessons 13: Digital Signatures

  • Digital Signatures
  • Elgamal Digital Signature Scheme
  • Schnorr Digital Signature Scheme
  • Nist Digital Signature Algorithm
  • Elliptic Curve Digital Signature Algorithm
  • RSA-PSS Digital Signature Algorithm

Lessons 14: Lightweight Cryptography and Post-Quantum Cryptography

  • Lightweight Cryptography Concepts
  • Lightweight Cryptographic Algorithms
  • Post-Quantum Cryptography Concepts
  • Post-Quantum Cryptographic Algorithms

Lessons 15: Cryptographic Key Management and Distribution

  • Symmetric Key Distribution Using Symmetric Encryption
  • Symmetric Key Distribution Using Asymmetric Encryption
  • Distribution of Public Keys
  • X.509 Certificates
  • Public-Key Infrastructure

Lessons 16: User Authentication

  • Remote User-Authentication Principles
  • Remote User-Authentication Using Symmetric Encryption
  • Kerberos
  • Remote User-Authentication Using Asymmetric Encryption
  • Federated Identity Management

Lessons 17: Transport-Level Security

  • Web Security Considerations
  • Transport Layer Security
  • HTTPS
  • Secure Shell (SSH)

Lessons 18: Wireless Network Security

  • Wireless Security
  • Mobile Device Security
  • IEEE 802.11 Wireless LAN Overview
  • IEEE 802.11i Wireless LAN Security

Lessons 19: Electronic Mail Security

  • Internet Mail Architecture
  • Email Formats
  • Email Threats and Comprehensive Email Security
  • S/MIME
  • DNSSEC
  • DNS-Based Authentication of Named Entities
  • Sender Policy Framework
  • Domainkeys Identified Mail
  • Domain-Based Message Authentication, Reporting, and Conformance

Lessons 20: IP Security

  • IP Security Overview
  • IP Security Policy
  • Encapsulating Security Payload
  • Combining Security Associations
  • Internet Key Exchange

Lessons 21: Network Endpoint Security

  • Firewalls
  • Intrusion Detection Systems
  • Malicious Software
  • Distributed Denial of Service Attacks

Lessons 22: Cloud Security

  • Cloud Computing
  • Cloud Security Concepts
  • Cloud Security Risks and Countermeasures
  • Cloud Security as a Service
  • An Open-Source Cloud Security Module

Lessons 23: Internet of Things (IoT) Security

  • The Internet of Things
  • IoT Security Concepts and Objectives
  • An Open-Source IoT Security Module

Appendix A: Basic Concepts from Linear Algebra

  • A.1 Operations on Vectors and Matrices
  • A.2 Linear Algebra Operations Over Zn

Appendix B: Measures of Secrecy and Security

  • B.1 Conditional Probability
  • B.2 Perfect Secrecy
  • B.3 Information and Entropy
  • B.4 Entropy and Secrecy
  • B.5 Min-Entropy

Appendix C: Data Encryption Standard

Appendix D: Simplified AES

  • D.1 Overview
  • D.2 S-AES Encryption and Decryption
  • D.3 Key Expansion
  • D.4 The S-box
  • D.5 S-AES Structure

Appendix E: Mathematical Basis of the Birthday Attack

  • E.1 Related Problem
  • E.2 The Birthday Paradox
  • E.3 Useful Inequality
  • E.4 The General Case of Duplications
  • E.5 Overlap Between Two Sets

Hands-on LAB Activities

Information and Network Security Concepts

  • Obtaining Information about an IP Version
  • Getting Information about the DNS
  • Getting Information about the UDP Ports
  • Getting Information about the Current Connection Statistics of UDP
  • Getting the UDP Settings
  • Getting Information about the TCP Ports
  • Getting Information about the Current Connection Statistics of TCP
  • Getting the TCP Settings
  • Obtaining Information about the Net Firewall Profile
  • Obtaining IP Route Information from the IP Routing Table

Classical Encryption Techniques

  • Using OWASP ZAP
  • Performing Symmetric Encryption

Advanced Encryption Standard

  • Encrypting a File or Folder
  • Configuring File and Share Permissions
  • Using BitLocker in Windows 10
  • Configuring MDT
  • Creating a New Partition and Configuring BitLocker
  • Implementing AES Encryption

Public-Key Cryptography and RSA

  • Using OpenSSL to Create a Public/Private Key Pair
  • Using the RSA Asymmetric Algorithm

Cryptographic Hash Functions

  • Installing Windows Server Backup and Performing Backup of a Folder
  • Creating a Backup Schedule
  • Creating a Backup Once
  • Configuring RAID
  • Configuring RAID 5
  • Installing the Failover Cluster Feature
  • Using the Dependency Viewer

Cryptographic Key Management and Distribution

  • Using Steganography
  • Enabling a Keylogger in a Target Machine

IP Security

  • Adding Revision to the Revision History
  • Viewing and Downloading the Policy Templates
  • Opening the Policy Template and Setting the Company Name
  • Reviewing and Modifying the Policy Items
scroll to top