Introduction
Keeping information safe
()
What you need to know
()
1. Safeguarding the Network
Providing security services
()
Compare network attacks
()
Introduce cryptographic terminology
()
Review the history of cryptography
()
Challenge: Coding with the Enigma
()
Solution: Coding with the Enigma
()
2. Dissecting Symmetric Encryption
Introducing symmetric encryption
()
Developing DES
()
Work with AES
()
Compare block and stream ciphers
()
Understand modes of operation
()
Secure wireless communication
()
Challenge: Encrypt data with AES
()
Solution: Encrypt data with AES
()
3. Exploring Asymmetric Encryption
Grasping public key cryptography
()
Exchanging keys using asymmetric encryption
()
Using digital signatures
()
Managing keys using PKI
()
Navigating certificates
()
4. Reviewing Hash Algorithms
Diving into hash algorithms
()
Looking deeper into message digests
()
Understanding passwords
()
Challenge: Password strength tests
()
Solution: Password strength tests
()
5. Applying Cryptography
Introducing Transport Layer Security
()
Providing email privacy
()
Implementing email security with GPG
()
Examining blockchain technology
()
Safeguarding cryptography
()
6. Securing the Internet Protocol
Exploring Internet Protocol Security
()
Dissecting the Authentication Header
()
Encapsulating Security Payload
()
Comparing IPsec operating modes
()
Ex_Files_Network_Security.zip
(102 KB)