You are on page 1of 2

1.

Introduction
a. Course Organization
b. Why does security matter?
c. C.I.A
d. Examples of Security Attacks
2. Cryptographic Techniques
a. Cryptology
i. Cryptography
ii. Cryptoanalysis
b. Symmetric cryptosystems
i. Classical Cipher
ii. Block cipher and stream cipher
iii. Modes and operations
c. Asymmetric cryptosystems
d. Cryptographic hash functions
e. Digital signatures
3. Key Management and Distribution
a. Symmetric Key Management
i. Key Transport
ii. Key Distribution Centre
b. Public Key Management
i. Key Agreement
ii. Man-in-the-Middle attack
4. User Authentication
a. Digital User Authentication
b. Authentication Mechanisms
i. Password based authentication
ii. Token based authentication
iii. Biometric based authentication
iv. Remote authentication
c. Authentication Protocols
i. Challenge-response
ii. X.509 Authentication
5. Access Control
a. Security Models
b. Access Control Model
c. Access Control Mechanisms
d. Access Control Policies
6. Operating System Security
a. Operating System Security
b. Unix basics
c. Unix Security
i. Access control
ii. Files access
iii. Unix Access Security
7. Distributed System Security (DSS) (Part 1 – Kerberos)
a. Distributed Computing
i. Client/Server Model
ii. Remote Procedure Call
b. Kerberos
i. Motivations
ii. Basic Ideas
iii. Technical Details
iv. Limitations
8. Distributed System Security (DSS) (Part 2 – Web Service Security)
a. Web Service Security
b. Simple Object Access Protocol (SOAP)
c. Security Assertion Markup Language (SAML)
d. OAuth
9. SSL/TLS
a. OSI Security Architecture
b. Secure Socket Layer (SSL)
c. Web Application Security
i. HTTPS
ii. SSH
10. Internet Protocol Security (IPSec)
a. IPSec Overview
b. Security Protocols and Modes
c. IPSec Policy
d. Internet Key Exchange (IKE) Protocol
11. Wireless Security
a. Threats
b. 802.11 Standards
c. Operational Modes
d. WEP
e. WPA
12. Email Security
a. SMTP
b. Email Security
c. Pretty Good Privacy (PGP)
d. S/MIME

You might also like