Computer Security

Welcome my students, I hope to enjoy learning our course.

The goal of this course is how to protect your data.

Lectures

1- Overview

We will discuss the following: Cryptography, Computer Security, OSI Security Architecture, Security Structure Scheme, Key Properties, Symmetric Encryption, Asymmetric Encryption, finally Our Book.

Download Slideshare

1- CCNA Security Overview

We will discuss the following: CCNAS Overview, Threats Landscape, Hackers Tools, Tools.

Download Slideshare

2- Classical Encryption Techniques 1

We will discuss the following: Symmetric Encryption, Substitution Techniques, Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher.

Download Slideshare

3- Classical Encryption Techniques 2

We will discuss the following: Polyalphabetic Ciphers, Vigenère Cipher, Autokey Cipher, Vernam Cipher, Transposition Techniques, Rail Fence Cipher, Row Transposition Cipher.

Download Slideshare

2- AAA

We will discuss the following: Classical Security Methods, AAA, Authentication, Authorization, Accounting, AAA Characteristic, Local Based AAA, Server Based AAA, TACACS+ and RADIUS.

Download Slideshare

4- Block Ciphers and the Data Encryption Standard

We will discuss the following: Stream Ciphers and Block Ciphers, Data Encryption Standard, DES Algorithm, DES Key Creation, DES Encryption, The Strength Of DES.

Download Slideshare

4.1- DES Supplementary Material

We will discuss the following: Data Encryption Standard, DES Algorithm, DES Key Creation.

Download Slideshare

5- Simplified Advanced Encryption Standard

We will discuss the following: Simplified Advanced Encryption Standard, S-AES Encryption and Decryption, S-AES Key Generation, S-AES Encryption, S-AES Decryption.

Download Slideshare

6- Advanced Encryption Standard

We will discuss the following: Advanced Encryption Standard, AES Key Expansion, AES Encryption, AES Decryption, DES vs AES, Advantages of AES.

Download Slideshare

7- RSA

We will discuss the following: RSA Key generation , RSA Encryption , RSA Decryption , A Real World Example, RSA Security.

Download Slideshare

Contact Me

Any Problem send me e-mail to mloey@live.com

Benha University: http://bu.edu.eg/staff/mloey