CYBERSECURITY coach

Ready for an adventure? Take a dive into the world of cybersecurity from exotic program of cybersecurity in St. Cloud State University. Student from little or no background of Cybersecurity are welcome to take this course.

Introduction to Cryptography and Cryptanalysis

1. Security Goals

2. Classification of Attacks

3. Passive Active Attacks

4. Security Services

5. Security Mechanisms

6. Relation between services and mechanism

7. Cryptography

8. Symmetric Key Encipherment

9. Asymmetric-key Encipherment

10. Steganography

11. Modulo Operations

12. How is Data Stored in Computers

Cryptography Algorithms

1. Symmetric-key cipher

2. Cryptanalysis

3. Cipher-text only attack

4. Known plaintext attack

5. Chosen plaintext attack

6. Chosen Ciphertext attack

7. Substitution Cipher

8. Additive cipher

9. Multiplicative Cipher

10. Vigenere Cipher

11. Polyalphabetic Ciphers

12. Autokey CIpher

13. Enigma Machine

14. Mapping

15. Mapping by Example

Modern Ciphers

1. Modern Block. Ciphers

2. Transposition Block Cipher

3. Substitution Block CIpher

4. Straight P-Box

5. Compression P-Box

6. Expansion P-Box

7. Invert a permutation table

8. Difussion, Confusion and Rounds

9. Fiestal and Non-fiestal

10. S-Box

11. Input Output relation

12. DES Cryptography Algorithm

13. AES Cryptography Algorithm

14. Asymmetric key Cryptography.mp4

15. Integrity

16. Message Authentication Code (MAC)

Cryptography Labs

1. Caesar Cipher

2. Vigenere Cipher

3. Autokey Cipher

4. Multiplicative Cipher

5. Enigma Machine

6. RSA

7. Digital Signature

8. DES

End User Security

1. Intro to End User Security

2. Password Security

3. Password Lab

4. Risks of Public Wi-Fi

5. Staying Safe on Public Wi-Fi

6. Cybercrimes

7. Phishing

Mobile Device Security

1. Securing Mobile Devices

2. Social Media

3. Staying Safe Online

Web and Internet Security

1. Introduction to WEB

2. Introduction to Internet

3. The Difference between Internet and Web

4. Why Web and Internet Security is Important

5. Demo of Clickjacking Attack

6. Demo of Cross-Site Scripting Attack

7. Demo of SQL Injection Attack

8. Demo of Access Control Vulnerabilities

Social Engineering Security

1. Introduction to Social Engineering

2. Type of Social Engineering Attacks

3. Baiting

4. Prevent Baiting

5. Scareware

6. Prevent Scareware

7. Pretexting

8. Prevent Pretexing

9. Phishing

8. Prevent Pretexing

11. Spear Phishing

12. Prevent Spear Phishing

13. Tailgating

14. Prevent Tailgating

Digital Forensics

1. Forensic Science

2. Digital Forensics

3. ORGANIZATIONS

4. Uses of DF

5. Digital Forensics Types

6. Case

7. Forensic Tools and Available options

8. Open Source and Paid

9. How the Process Goes in Digital Forensics

10. How we Preserve Data

11. Workflow

12. Importing and Analyzing Data

Steganography

1. Internet Usage

2. Need of Security

3. Available methods for Data Protection

4. History of Steganography

5. STEGANALYSIS

6. Types Of Steganography

7. How Data is Loaded for Steganography

8. Working Scenario

9. Available Tools

10. Usage Of Spam Mimic

11. Modern Day Usage

12. Pros and Cons