Themabewertung:
  • 0 Bewertung(en) - 0 im Durchschnitt
  • 1
  • 2
  • 3
  • 4
  • 5
Computer Security: Fundamental Concepts and Practices
#1
[Bild: 43932644bb394yjh1.jpg]

Computer Security: Fundamental Concepts and Practices
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 13 lectures (15h 2m) | Size: 6.9 GB



What you'll learn
This course aims to cover the fundamental concepts and practices of computer security.
To familiarize students with various computer security issues and mitigation strategies.
This course covers various topics like Computer Security Overview, Cryptographic Tools, Symmetric Encryption & Message Confidentiality, Public-Key Cryptography
Message Authentication, Malicious Software, Denial-of-Service Attacks, Database Security, Intrusion Detection, Trusted Computing and Multilevel Security.
Human Resources Security, Hardware Security, IoT Security, Legal and Ethical Aspects.
Requirements
Basic knowledge in Information Security / Cyber Security / Network Security
Description
LECTURE 1 : COMPUTER SECURITY OVERVIEW
1.1 Computer Security Concepts
1.2 Assets, Vulnerabilities, Threats and Attacks
1.3 Security Functional Requirements
1.4 Fundamental Security Design Principles
1.5 Attack Surfaces
1.6 Computer Security Strategy
1.7 Thwarting Cyber Criminals/ Attackers
LECTURE 2 : CRYPTOGRAPHIC TOOLS
2.1 Symmetric Encryption
2.2 Message Authentication and Hash Functions
2.3 Public-Key Encryption
2.4 Digital Signatures & Envelops
2.5 Random and Pseudorandom Numbers
2.6 Symmetric vs Asymmetric
LECTURE 3: SYMMETRIC ENCRYPTION AND MESSAGE CONFIDENTIALITY
3.1 Symmetric Encryption Principles
3.2 Data Encryption Standard
3.3 Advanced Encryption Standard
3.4 Cipher Block Modes of Operation
3.5 Key Distribution
LECTURE 4: PUBLIC-KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION
4.1 Secure Hash Functions
4.2 HMAC
4.3 The RSA Public-Key Encryption Algorithm
4.4 Diffie-Hellman Key Exchange Protocol
LECTURE 5 - MALICIOUS SOFTWARE
5.1 Malware
5.2 Viruses
5.3 Worms
5.4 Bots
5.5 Rootkits
5.6 Mobile Code
5.7 Mobile Phone Worms
5.8 Malware terminologies
LECTURE 6 - DENIAL-OF-SERVICE ATTACKS
6.1 Denial of Service Attacks
6.2 Source Address Spoofing
6.3 SYN Spoofing
6.4 Flooding Attacks
6.5 DDOS
6.6 Amplification Attacks
6.7 DNS Amplification Attacks
6.8 DOS Attack defenses
6.9 Attack Prevention
LECTURE 7 - DATABASE SECURITY
7.1 Relational Database Example
7.2 Database Access Control
7.3 SQL Access Controls
7.4 Role-Based Access Control
7.5 Inference
7.6 Statistical Databases (SDB)
7.7 Protecting Against Inference
7.8 Database Encryption
7.9 SQL Injection Attacks
LECTURE 8 - INTRUSION DETECTION
8.1 Intruders
8.2 Classes of intruders
8.3 Examples of Intrusion
8.4 Security Intrusion & Detection
8.5 Intrusion Techniques
8.6 Intrusion Detection Systems
8.7 IDS Principles
8.8 IDS Requirements
8.9 Host-Based IDS
8.10 Network-Based IDS
8.11 Intrusion Detection Exchange Format
8.12 Honeypot
LECTURE 9 - TRUSTED COMPUTING AND MULTILEVEL SECURITY
9.1 Computer Security Models
9.2 Bell-LaPadula (BLP) Model
9.3 Multilevel Security (MLS)
9.4 Common Criteria (CC)
LECTURE 10 - HUMAN RESOURCES SECURITY
10.1 Security Awareness, Training, and Education
10.2 Polices and Employment Practices
10.3 E-Mail and Internet Use Policies
10.4 Computer Security Incident Response Teams
LECTURE 11 - HARDWARE SECURITY
11.1 Introduction
11.2 Hardware attacks
11.3 Goals of Hardware Attack
11.4 Common hardware Attacks
11.5 Types of Hardware Attacks
11.6 Types of Hardware Attackers
11.7 Hardware Trojan
11.8 Types of Hardware Backdoors
11.9 Hardware backdoors prevention
11.10 Hardware backdoor detection
11.11 Methods for disabling backdoor triggers
11.12 Security during product development
11.13 Anti-Tamper Mechanisms
11.14 Cryptographic Processors and Algorithms
LECTURE 12 - IOT SECURITY
12.1 The IoT Era Begins
12.2 Components of IoT-Enabled Things
12.3 IoT Reference model
12.4 IoT Security
12.5 IoT Security & Privacy Req. defined by ITU-T
12.6 An IoT Security Framework
12.7 IoT Security Challenges
12.8 Internet of Things - Liability
12.9 IoT security tools
LECTURE 13 LEGAL AND ETHICAL ASPECTS
13.1 Cybercrime and Computer Crime
13.2 Intellectual Property
13.3 Privacy and Ethical Issues
Who this course is for
Beginners, Intermediates, and Experts in the field of Cyber Security.


[Bild: computersecurityfundaejjbk.jpg]

Download from RapidGator

Download from Rapidgator:

Download from Keep2Share
Zitieren


Möglicherweise verwandte Themen…
Thema Verfasser Antworten Ansichten Letzter Beitrag
  Azure Fundamental AZ-900 Panter 0 32 04.03.2024, 12:42
Letzter Beitrag: Panter
  Pro Engineer Creo Fundamental 3D design course Panter 0 58 10.07.2023, 23:19
Letzter Beitrag: Panter
  Meditation And Mindfulness - Fundamental First Principles Panter 0 81 08.07.2023, 11:04
Letzter Beitrag: Panter
  Udemy - Advanced JavaScript Concepts Panter 0 117 13.06.2023, 23:15
Letzter Beitrag: Panter
  Security Operations During Covid-19 (Pandemic Security) + Panter 0 82 25.12.2022, 20:35
Letzter Beitrag: Panter
  Technical and Fundamental Course - Diamant Capital Academy emmuon91 0 58 06.12.2022, 13:56
Letzter Beitrag: emmuon91

Gehe zu:


Benutzer, die gerade dieses Thema anschauen: 1 Gast/Gäste
Expand chat