• Home
  • About Us
    • Who We Are
      • Director’s Profile
    • Lead Contributors
  • Courses

    About Courses

    • All Courses
    • Free Courses
    • Free Webinars
    • Premium Courses
    • Python Learning Path
    • Become a Lead Contributor
    Getting Started with Python

    Getting Started with Python

    ₹999.00
    Read More
  • Students Panel
    • Events
    • Forum
    • FAQs
  • Book Store
  • Blog
  • Contact
    Have any question?
    [email protected]
    Login
    IT Expert Training
    • Home
    • About Us
      • Who We Are
        • Director’s Profile
      • Lead Contributors
    • Courses

      About Courses

      • All Courses
      • Free Courses
      • Free Webinars
      • Premium Courses
      • Python Learning Path
      • Become a Lead Contributor
      Getting Started with Python

      Getting Started with Python

      ₹999.00
      Read More
    • Students Panel
      • Events
      • Forum
      • FAQs
    • Book Store
    • Blog
    • Contact

      Security

      • Home
      • All courses
      • Security
      • Cryptography and Network Security

      Cryptography and Network Security

      User Avatar
      ITET Admin
      Security
      (0 review)
      Free
      cryptography&network-security
      • Overview
      • Curriculum
      • Instructor
      • Reviews

      Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. The pre-fix “crypt” means “hidden” or “vault” and the suffix “graphy” stands for “writing.”

      In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation and digital signing and verification to protect data privacy, web browsing on the internet and confidential communications such as credit card transactions and email.

      Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to thenetwork. It targets a variety of threats and stops them from entering or spreading on your network.

      This free course develops a basic understanding of the algorithms used to protect users online and to understand some of the design choices behind these algorithms. Our aim is to develop a workable knowledge of the mathematics used in cryptology in this course. The course emphasizes to give a basic understanding of previous attacks on cryptosystems with the aim of preventing future attacks. A wide variety of basic cryptographic primitives will be discussed along with recent developments in some advanced topics like identity-based encryption, attribute-based encryption, functional encryption, two-party/multi-party computation, bitcoin and crypto-currency and postquantum cryptography. The cryptanalysis part will help us understanding challenges for cybersecurity that includes network security, data security, mobile security, cloud security and endpoint security.

      Course Features

      • Lectures 39
      • Quizzes 0
      • Duration 20 hours
      • Students 22
      • Certificate No
      • Assessments Yes
      ITET CoursesSecurityCryptography and Network Security
      • Chapter 1
        7
        • Lecture1.1
          Introduction to Cryptography 05 min
        • Lecture1.2
          Types of attacks in Network Security 06 min
        • Lecture1.3
          Euclidean algorithm 05 min
        • Lecture1.4
          Additive Cipher – Encryption Decryption Method 05 min
        • Lecture1.5
          Multiplicative Cipher – Encryption Decryption Method 10 min
        • Lecture1.6
          Multiplicative Inverse 06 min
        • Lecture1.7
          Additive Inverse 03 min
      • Chapter 2
        7
        • Lecture2.1
          Affine Cipher – Encryption Decryption Method 08 min
        • Lecture2.2
          What Is Cryptanalysis On Cryptography 05 min
        • Lecture2.3
          Cryptanalysis Of Affine Cipher – Part 1 08 min
        • Lecture2.4
          Cryptanalysis Of Affine Cipher – Part 2 09 min
        • Lecture2.5
          Auto Key Cipher – Encryption Decryption Method 06 min
        • Lecture2.6
          Play Fair Cipher – Encryption Decryption Method 11 min
        • Lecture2.7
          Vigenere Cipher – Encryption Decryption Method 10 min
      • Chapter 3
        7
        • Lecture3.1
          Chinese Remainder Theorem 10 min
        • Lecture3.2
          Fermat’s Primality Testing 05 min
        • Lecture3.3
          Miller Rabin Primality Test 08 min
        • Lecture3.4
          Euler’s Theorem 04 min
        • Lecture3.5
          Inverse Using Euler’s Theorem 09 min
        • Lecture3.6
          Fermat’s Little Theorem 05 min
        • Lecture3.7
          Inverse Using Fermat’s Little Theorem 10 min
      • Chapter 4
        6
        • Lecture4.1
          How To Find Out Whether The Given Number Is Prime Or Not ?? 04 min
        • Lecture4.2
          Mathematics Of Cryptography – Part 1 03 min
        • Lecture4.3
          Mathematics Of Cryptography – Part 2 06 min
        • Lecture4.4
          Cyclic Group 06 min
        • Lecture4.5
          Ring & Field 04 min
        • Lecture4.6
          Euler’s Phi Function 05 min
      • Chapter 5
        6
        • Lecture5.1
          Elgamal Encryption and Decryption Algorithm 06 min
        • Lecture5.2
          Diffie Hellman Key Exchange 04 min
        • Lecture5.3
          Knapsack Problem In Cryptography 14 min
        • Lecture5.4
          Euler’s Criteria For Quadratic Residues and Non Residues 04 min
        • Lecture5.5
          Quadratic Residue And Quadratic Non Residue 04 min
        • Lecture5.6
          The Extended Euclidean Algorithm 06 min
      • Chapter 6
        6
        • Lecture6.1
          RSA Algorithm 08 min
        • Lecture6.2
          Digital Signature Standard Algorithm 15 min
        • Lecture6.3
          Elgamal Cryptosystem 12 min
        • Lecture6.4
          Rabin Cryptosystem 15 min
        • Lecture6.5
          Common Modulus Attack 13 min
        • Lecture6.6
          Low Exponent Attack 15 min
      author avatar
      ITET Admin

      Reviews

      Average Rating

      0
      0 rating

      Detailed Rating

      5
      0%
      4
      0%
      3
      0%
      2
      0%
      1
      0%
      • Overview
      • Curriculum
      • Instructor
      • Reviews
      Free
      • Share:

      You May Like

      Getting Started with Python Read More
      ilyas

      Getting Started with Python

      179
      1
      ₹999.00
      Automation with Python Read More
      ilyas

      Automation with Python

      30
      0
      ₹1,999.00
      Web Development with Python Read More
      ilyas

      Web Development with Python

      19
      0
      ₹1,999.00
      Computer Vision With Python Read More
      ilyas

      Computer Vision With Python

      13
      0
      ₹1,999.00
      Associate Big Data Engineer Read More
      ITET Admin

      Associate Big Data Engineer

      5
      0
      ₹70,566.97

      Categories

      • Artificial Intelligence
      • Cloud
      • Database
      • Network
      • OS
      • Others
      • Programming
      • Security
      • Storage
      • Trending
      • Virtualization
      • Webinars

      Popular Courses

      Getting Started with Python

      Getting Started with Python

      ₹999.00
      Computer Vision With Python

      Computer Vision With Python

      ₹1,999.00
      Web Development with Python

      Web Development with Python

      ₹1,999.00
      web_logo

      5/3, 6th Avenue, Ashok Nagar, Chennai-83

      [email protected]

      More Links

      • Free Courses
      • Events
      • Forums
      • FAQs

      IT Expert Training

      • Free Webinars
      • Who We Are
      • Contact
      • Book Store

      Copyright © 2019 IT Expert Training | Powered by TripleM Infotech

      Login with your site account

      Lost your password?

      Modal title

      Message modal