Cybersecurity and Information Security

  1. Cryptography and Cryptographic Systems
    1. Cryptographic Fundamentals
      1. Basic Concepts
        1. Plaintext and Ciphertext
          1. Encryption and Decryption
            1. Cryptographic Keys
              1. Key Space and Key Length
                1. Cryptographic Algorithms
                2. Cryptographic Principles
                  1. Kerckhoffs's Principle
                    1. Perfect Secrecy
                      1. Computational Security
                        1. Provable Security
                        2. Cryptanalysis
                          1. Attack Models
                            1. Ciphertext-Only Attacks
                              1. Known-Plaintext Attacks
                                1. Chosen-Plaintext Attacks
                                  1. Chosen-Ciphertext Attacks
                                  2. Cryptanalytic Techniques
                                    1. Frequency Analysis
                                      1. Differential Cryptanalysis
                                        1. Linear Cryptanalysis
                                    2. Symmetric Cryptography
                                      1. Symmetric Key Concepts
                                        1. Shared Secret Keys
                                          1. Key Distribution Problem
                                            1. Key Management Lifecycle
                                            2. Block Ciphers
                                              1. Advanced Encryption Standard
                                                1. AES-128
                                                  1. AES-192
                                                    1. AES-256
                                                      1. AES Implementation
                                                      2. Data Encryption Standard
                                                        1. DES Algorithm
                                                          1. DES Weaknesses
                                                          2. Triple DES
                                                            1. 3DES Operation
                                                              1. Key Options
                                                            2. Stream Ciphers
                                                              1. Stream Cipher Principles
                                                                1. RC4 Algorithm
                                                                  1. ChaCha20
                                                                    1. Salsa20
                                                                    2. Modes of Operation
                                                                      1. Electronic Codebook Mode
                                                                        1. Cipher Block Chaining Mode
                                                                          1. Cipher Feedback Mode
                                                                            1. Output Feedback Mode
                                                                              1. Counter Mode
                                                                                1. Galois/Counter Mode
                                                                              2. Asymmetric Cryptography
                                                                                1. Public Key Concepts
                                                                                  1. Public and Private Key Pairs
                                                                                    1. Key Generation Process
                                                                                      1. Key Distribution
                                                                                        1. Digital Envelopes
                                                                                        2. RSA Cryptosystem
                                                                                          1. RSA Key Generation
                                                                                            1. RSA Encryption
                                                                                              1. RSA Decryption
                                                                                                1. RSA Security Considerations
                                                                                                2. Elliptic Curve Cryptography
                                                                                                  1. Elliptic Curve Mathematics
                                                                                                    1. ECC Key Generation
                                                                                                      1. ECC Advantages
                                                                                                        1. Curve Selection
                                                                                                        2. Key Exchange Protocols
                                                                                                          1. Diffie-Hellman Key Exchange
                                                                                                            1. Elliptic Curve Diffie-Hellman
                                                                                                              1. Key Agreement Protocols
                                                                                                              2. Digital Signatures
                                                                                                                1. Digital Signature Algorithms
                                                                                                                  1. Signature Generation
                                                                                                                    1. Signature Verification
                                                                                                                      1. Non-Repudiation
                                                                                                                    2. Hash Functions and Message Authentication
                                                                                                                      1. Cryptographic Hash Functions
                                                                                                                        1. Hash Function Properties
                                                                                                                          1. Preimage Resistance
                                                                                                                            1. Second Preimage Resistance
                                                                                                                              1. Collision Resistance
                                                                                                                                1. Avalanche Effect
                                                                                                                                2. Hash Algorithms
                                                                                                                                  1. MD5
                                                                                                                                    1. SHA-1
                                                                                                                                      1. SHA-2 Family
                                                                                                                                        1. SHA-3
                                                                                                                                      2. Message Authentication Codes
                                                                                                                                        1. HMAC Construction
                                                                                                                                          1. CMAC
                                                                                                                                            1. Authentication vs Encryption
                                                                                                                                            2. Applications of Hash Functions
                                                                                                                                              1. Password Storage
                                                                                                                                                1. Data Integrity Verification
                                                                                                                                                  1. Digital Forensics
                                                                                                                                                    1. Blockchain Technology
                                                                                                                                                  2. Public Key Infrastructure
                                                                                                                                                    1. PKI Components
                                                                                                                                                      1. Certificate Authorities
                                                                                                                                                        1. Root Certificate Authorities
                                                                                                                                                          1. Intermediate Certificate Authorities
                                                                                                                                                            1. Registration Authorities
                                                                                                                                                            2. Digital Certificates
                                                                                                                                                              1. X.509 Certificate Format
                                                                                                                                                                1. Certificate Fields
                                                                                                                                                                  1. Certificate Types
                                                                                                                                                                  2. Certificate Repositories
                                                                                                                                                                  3. Certificate Management
                                                                                                                                                                    1. Certificate Lifecycle
                                                                                                                                                                      1. Certificate Enrollment
                                                                                                                                                                        1. Certificate Issuance
                                                                                                                                                                          1. Certificate Renewal
                                                                                                                                                                            1. Certificate Revocation
                                                                                                                                                                            2. Certificate Validation
                                                                                                                                                                              1. Certificate Path Validation
                                                                                                                                                                                1. Certificate Revocation Lists
                                                                                                                                                                                  1. Online Certificate Status Protocol
                                                                                                                                                                                2. Trust Models
                                                                                                                                                                                  1. Hierarchical Trust Model
                                                                                                                                                                                    1. Web of Trust Model
                                                                                                                                                                                      1. Bridge Trust Model