Useful Links
Computer Science
Cybersecurity
Cybersecurity and Information Security
1. Foundations of Information Security
2. Cryptography and Cryptographic Systems
3. Network Security Architecture
4. System and Endpoint Security
5. Application Security and Secure Development
6. Identity and Access Management
7. Security Operations and Incident Management
8. Governance, Risk Management, and Compliance
9. Offensive Security and Threat Intelligence
10. Emerging Technologies and Advanced Topics
Cryptography and Cryptographic Systems
Cryptographic Fundamentals
Basic Concepts
Plaintext and Ciphertext
Encryption and Decryption
Cryptographic Keys
Key Space and Key Length
Cryptographic Algorithms
Cryptographic Principles
Kerckhoffs's Principle
Perfect Secrecy
Computational Security
Provable Security
Cryptanalysis
Attack Models
Ciphertext-Only Attacks
Known-Plaintext Attacks
Chosen-Plaintext Attacks
Chosen-Ciphertext Attacks
Cryptanalytic Techniques
Frequency Analysis
Differential Cryptanalysis
Linear Cryptanalysis
Symmetric Cryptography
Symmetric Key Concepts
Shared Secret Keys
Key Distribution Problem
Key Management Lifecycle
Block Ciphers
Advanced Encryption Standard
AES-128
AES-192
AES-256
AES Implementation
Data Encryption Standard
DES Algorithm
DES Weaknesses
Triple DES
3DES Operation
Key Options
Stream Ciphers
Stream Cipher Principles
RC4 Algorithm
ChaCha20
Salsa20
Modes of Operation
Electronic Codebook Mode
Cipher Block Chaining Mode
Cipher Feedback Mode
Output Feedback Mode
Counter Mode
Galois/Counter Mode
Asymmetric Cryptography
Public Key Concepts
Public and Private Key Pairs
Key Generation Process
Key Distribution
Digital Envelopes
RSA Cryptosystem
RSA Key Generation
RSA Encryption
RSA Decryption
RSA Security Considerations
Elliptic Curve Cryptography
Elliptic Curve Mathematics
ECC Key Generation
ECC Advantages
Curve Selection
Key Exchange Protocols
Diffie-Hellman Key Exchange
Elliptic Curve Diffie-Hellman
Key Agreement Protocols
Digital Signatures
Digital Signature Algorithms
Signature Generation
Signature Verification
Non-Repudiation
Hash Functions and Message Authentication
Cryptographic Hash Functions
Hash Function Properties
Preimage Resistance
Second Preimage Resistance
Collision Resistance
Avalanche Effect
Hash Algorithms
MD5
SHA-1
SHA-2 Family
SHA-3
Message Authentication Codes
HMAC Construction
CMAC
Authentication vs Encryption
Applications of Hash Functions
Password Storage
Data Integrity Verification
Digital Forensics
Blockchain Technology
Public Key Infrastructure
PKI Components
Certificate Authorities
Root Certificate Authorities
Intermediate Certificate Authorities
Registration Authorities
Digital Certificates
X.509 Certificate Format
Certificate Fields
Certificate Types
Certificate Repositories
Certificate Management
Certificate Lifecycle
Certificate Enrollment
Certificate Issuance
Certificate Renewal
Certificate Revocation
Certificate Validation
Certificate Path Validation
Certificate Revocation Lists
Online Certificate Status Protocol
Trust Models
Hierarchical Trust Model
Web of Trust Model
Bridge Trust Model
Previous
1. Foundations of Information Security
Go to top
Next
3. Network Security Architecture