Network Security and Vulnerability Exploitation

  1. Cryptography in Network Security
    1. Cryptographic Fundamentals
      1. Cryptographic Goals
        1. Kerckhoffs's Principle
          1. Perfect Secrecy
            1. Computational Security
            2. Symmetric Cryptography
              1. Block Ciphers
                1. Data Encryption Standard
                  1. Advanced Encryption Standard
                    1. Block Cipher Modes
                      1. Electronic Codebook
                        1. Cipher Block Chaining
                          1. Counter Mode
                            1. Galois/Counter Mode
                          2. Stream Ciphers
                            1. RC4
                              1. ChaCha20
                                1. Stream Cipher Properties
                                2. Key Management
                                  1. Key Generation
                                    1. Key Distribution
                                      1. Key Storage
                                        1. Key Rotation
                                      2. Asymmetric Cryptography
                                        1. Public Key Concepts
                                          1. RSA Algorithm
                                            1. Key Generation Process
                                              1. Encryption and Decryption
                                                1. Digital Signatures
                                                2. Elliptic Curve Cryptography
                                                  1. Curve Parameters
                                                    1. ECDSA
                                                      1. ECDH
                                                      2. Diffie-Hellman Key Exchange
                                                        1. Key Agreement Protocol
                                                          1. Security Properties
                                                        2. Cryptographic Hash Functions
                                                          1. Hash Function Properties
                                                            1. Common Hash Algorithms
                                                              1. MD5
                                                                1. SHA-1
                                                                  1. SHA-2 Family
                                                                    1. SHA-3
                                                                    2. Message Authentication Codes
                                                                      1. HMAC
                                                                        1. CMAC
                                                                        2. Password Hashing
                                                                          1. bcrypt
                                                                            1. scrypt
                                                                              1. Argon2
                                                                            2. Digital Signatures and PKI
                                                                              1. Digital Signature Schemes
                                                                                1. Certificate Authorities
                                                                                  1. Certificate Validation
                                                                                    1. Certificate Revocation
                                                                                      1. Certificate Revocation Lists
                                                                                        1. Online Certificate Status Protocol
                                                                                        2. Public Key Infrastructure Components
                                                                                          1. Registration Authority
                                                                                            1. Certificate Authority
                                                                                              1. Validation Authority
                                                                                              2. Trust Models
                                                                                                1. Hierarchical Trust
                                                                                                  1. Web of Trust
                                                                                                    1. Bridge CA Model
                                                                                                  2. Transport Layer Security
                                                                                                    1. TLS Protocol Versions
                                                                                                      1. TLS Handshake Process
                                                                                                        1. Cipher Suites
                                                                                                          1. Certificate Validation
                                                                                                            1. Perfect Forward Secrecy
                                                                                                              1. TLS Attacks and Mitigations
                                                                                                                1. BEAST
                                                                                                                  1. CRIME
                                                                                                                    1. BREACH
                                                                                                                      1. Heartbleed