CYBERSECURITY coach Ready for an adventure? Take a dive into the world of cybersecurity from exotic program of cybersecurity in St. Cloud State University. Student from little or no background of Cybersecurity are welcome to take this course. Introduction to Cryptography and Cryptanalysis 1. Security Goals 2. Classification of Attacks 3. Passive Active Attacks 4. Security Services 5. Security Mechanisms 6. Relation between services and mechanism 7. Cryptography 8. Symmetric Key Encipherment 9. Asymmetric-key Encipherment 10. Steganography 11. Modulo Operations 12. How is Data Stored in Computers Cryptography Algorithms 1. Symmetric-key cipher 2. Cryptanalysis 3. Cipher-text only attack 4. Known plaintext attack 5. Chosen plaintext attack 6. Chosen Ciphertext attack 7. Substitution Cipher 8. Additive cipher 9. Multiplicative Cipher 10. Vigenere Cipher 11. Polyalphabetic Ciphers 12. Autokey CIpher 13. Enigma Machine 14. Mapping 15. Mapping by Example Modern Ciphers 1. Modern Block. Ciphers 2. Transposition Block Cipher 3. Substitution Block CIpher 4. Straight P-Box 5. Compression P-Box 6. Expansion P-Box 7. Invert a permutation table 8. Difussion, Confusion and Rounds 9. Fiestal and Non-fiestal 10. S-Box 11. Input Output relation 12. DES Cryptography Algorithm 13. AES Cryptography Algorithm 14. Asymmetric key Cryptography.mp4 15. Integrity 16. Message Authentication Code (MAC) Cryptography Labs 1. Caesar Cipher 2. Vigenere Cipher 3. Autokey Cipher 4. Multiplicative Cipher 5. Enigma Machine 6. RSA 7. Digital Signature 8. DES End User Security 1. Intro to End User Security 2. Password Security 3. Password Lab 4. Risks of Public Wi-Fi 5. Staying Safe on Public Wi-Fi 6. Cybercrimes 7. Phishing Mobile Device Security 1. Securing Mobile Devices 2. Social Media 3. Staying Safe Online Web and Internet Security 1. Introduction to WEB 2. Introduction to Internet 3. The Difference between Internet and Web 4. Why Web and Internet Security is Important 5. Demo of Clickjacking Attack 6. Demo of Cross-Site Scripting Attack 7. Demo of SQL Injection Attack 8. Demo of Access Control Vulnerabilities Social Engineering Security 1. Introduction to Social Engineering 2. Type of Social Engineering Attacks 3. Baiting 4. Prevent Baiting 5. Scareware 6. Prevent Scareware 7. Pretexting 8. Prevent Pretexing 9. Phishing 8. Prevent Pretexing 11. Spear Phishing 12. Prevent Spear Phishing 13. Tailgating 14. Prevent Tailgating Digital Forensics 1. Forensic Science 2. Digital Forensics 3. ORGANIZATIONS 4. Uses of DF 5. Digital Forensics Types 6. Case 7. Forensic Tools and Available options 8. Open Source and Paid 9. How the Process Goes in Digital Forensics 10. How we Preserve Data 11. Workflow 12. Importing and Analyzing Data Steganography 1. Internet Usage 2. Need of Security 3. Available methods for Data Protection 4. History of Steganography 5. STEGANALYSIS 6. Types Of Steganography 7. How Data is Loaded for Steganography 8. Working Scenario 9. Available Tools 10. Usage Of Spam Mimic 11. Modern Day Usage 12. Pros and Cons