Module 1
Services , Mechanism and Attack
Network Security model
Keyed and keyless transposition technique
Numericals: Playfair (But practice all)
Module 2
Block cipher modes
DES and Triple DES
RSA
Diffie Hellman
(Knapsack and El-Gamal)
Module 3
MAC, HMAC, CMAC
Hash function
MD5 & SHA-1
X.509
PKI
Module 4
Digital signature and certificate
Digital signature algorithm
Needham Schroeder
Module 5
Memory and Address protection
File protection
Vulnerabilities of Linux and windows
Database security
Database security requirements
Multivel database security
Module 6
SSL
Web browser attacks
Click jacking
Cross site request forgery
Session hijacking and management
Phishing technique
DNS attack
Email attack
Firewall