Security Concepts: Confidentiality, Integrity, and Availability, Cryptography, Confusion vs Diffusion, Stream vs Block ciphers, Private-Key vs Public Key Cryptography, Cryptanalysis. Feistal Networks and Non Feistal Networks, Key Exchange, Public Key Encryption systems. Hash Functions, Message Digest, Signing and Verification, X509 certificates, SSL, TLS, HTTPS, Open SSL.
Authentication and Authorization: Identity and Access Management, Factors, Multi-factor, Kerberos, Role based Access Control. Operating System Security: Windows and Linux,
Protection System, Authorization, Security Analysis and Vulnerabilities, Security issues related to Internet, Intranet, Cloud Computing, Embedded System, Mobile System, Internet of Things and Wireless Networks.
Database Security: Securing different types of data, Database security, Data sanitization, Attacks on Data, SQL Injection, Buffer-flow, Privacy of Data, Security issues in Big Data and Cloud. Implementing Cryptographic schemes on datasets. Tools: Snort, NPM, Open VAS, Burp Suite, Nessus. Case Study: Implementing Cryptographic schemes on datasets. Understanding vulnerabilities using security tools: Snort, NPM, Open VAS, Burp Suite, Nessus.