Daffodil Institute of IT (DIIT)
  • Home
  • Events
  • Forum
  • Courses
  • Application
  • Contact us
  • Career
  • Wiki
  • Exam Status
  • Sign in
Contact Us
Lessons Write a review Share
Exit Fullscreen Back to course
Computer and Network Security
  • Lecture 1
    • Course Synopsis of Computer and Network security
    • Refereed e-Book of Computer and Network security
      • Refereed e-Book of Computer and Network security
    • Syllabus of Computer and Network Security
    • Previous NU Board question of Network security
      • Previous NU Board question of Network security
    • PowerPoint Slide of Chapter 1: Introduction
      • PowerPoint Slide of Chapter 1: Introduction
    • NETWORK SECURITY - BASIC CONCEPTS
    • Tahmina Aktar Trisha-DIIT- Security Goals and Threats
    • Network Security Demonstrate by--Cisco
      • Network Security Demonstrate by--Cisco
    • Recent Network Security Articles
      • Recent Network Security Articles
  • Lecture 2 : Network Security and Access model
    • PowerPoint Slide of Chapter 1: Network security model
      • PowerPoint Slide of Chapter 1: Network security model
    • Network Security Model Explained Easily
    • Quiz 1: Chapter 1
    • Trisha's Hand notes on- Chapter 1- Introduction
      • Trisha's Hand notes on- Chapter 1- Introduction
    • Sample Mid Term Question- Network Security
    • Tahmina Aktar Trisha-DIIT- Network Security- Active and Passive attacks
    • Video on Security Attacks
      • Video on Security Attacks
    • Class Recorded on Conducted Quiz 1
      • Class Recorded on Conducted Quiz 1
  • Lecture 3 : Cryptography
    • PowerPoint Slide of Chapter : 2 Cryptography
      • PowerPoint Slide of Chapter : 2 Cryptography
    • Public Key Cryptography - Computerphile
    • Symmetric Key and Public Key Encryption
    • Trisha's- Hand notes on- Chapter 2- Classical Encryption Technique
      • Trisha's- Hand notes on- Chapter 2- Classical Encryption Technique
    • Research on Unshared Secret Key Cryptography
      • Research on Unshared Secret Key Cryptography
  • Lecture 4: Poly alphabetic, Mono Alphabetic, Hill Ciphers
    • PowerPoint Slide of Chapter : 2 Cryptography
      • PowerPoint Slide of Chapter : 2 Cryptography
    • Polyalphabetic Substitution Cipher explained step by step with example !!!
    • Playfair Cipher || Network Security in Bangla || How to convert Plaintext into Cipher text in bangla
    • hill cipher decryption 3×3 matrix
    • One time pad Cipher (Vernam Cipher)
    • Trisha's- Hand notes on- Chapter 2- Ciphers
      • Trisha's- Hand notes on- Chapter 2- Ciphers
  • Lecture 5: Block Ciphers and Encryption standard method
    • PowerPoint slide of Chapter 3: Block Cipher and DES
      • PowerPoint slide of Chapter 3: Block Cipher and DES
    • Quiz 2: Chapter 2
      • Quiz 2: Chapter 2
    • NETWORK SECURITY - DES (DATA ENCRYPTION STANDARD) ALGORITHM
    • Feistel Cipher - Computerphile
    • Published Research on DES
      • Published Research on DES
    • Trisha's Hand notes on- Chapter 3- Block cipher & Data encryption standard
      • Trisha's Hand notes on- Chapter 3- Block cipher & Data encryption standard
    • Class Recorded on Conducted Quiz 2
      • Class Recorded on Conducted Quiz 2
    • NETWORK SECURITY - FEISTEL STRUCTURE
    • DES encryption animation and example part 4(DES)
  • Lecture 6: Double DES
    • Recorded Link of Class on Double DES
      • Recorded Link of Class on Double DES
    • PowerPoint slide of Chapter 6: Double DES
      • PowerPoint slide of Chapter 6: Double DES
    • S Box (Substitution Box)
    • S-Box Theory
    • Trisha's Hand notes on- Chapter 6- More on Symmetric ciphers
      • Trisha's Hand notes on- Chapter 6- More on Symmetric ciphers
    • Recorded Link of Conducted demo Quiz
      • Recorded Link of Conducted demo Quiz
  • Lecture 7: Block cipher modes of operation
    • PowerPoint Slide of Chapter 6: Block Cipher Modes
      • PowerPoint Slide of Chapter 6: Block Cipher Modes
    • NETWORK SECURITY - BLOCK CIPHER MODES OF OPERATION
    • Research on Block Cipher modes
      • Research on Block Cipher modes
    • Recorded Link of Class on Block Cipher Modes of operation
      • Class on Block Cipher modes of operation
    • Trisha's Hand notes on- Chapter 6- Block ciphers Modes
      • Trisha's Hand notes on- Chapter 6- Block ciphers Modes
  • Lecture 8: Confidentiality using Symmetric Encryption
    • PowerPoint Slide of Chapter 7: Confidentiality using symmetric Encryption
      • PowerPoint Slide of Chapter 7: Confidentiality using symmetric Encryption
    • Session Keys
    • Recorded Link of Class on Link & end-to-end encryption
      • Recorded Link of Class on Link & end-to-end encryption
    • Link encryption vs. End to end encryption
    • Trisha's Hand notes on- Chapter 7- Confidentiality using symmetric encryption
      • Trisha's Hand notes on- Chapter 7- Confidentiality using symmetric encryption
  • Lecture 9: Key Distribution scenario
    • PowerPoint Slide of Chapter 7: Key distribution Scenario
      • PowerPoint Slide of Chapter 7: Key distribution Scenario
    • NETWORK SECURITY - PUBLIC KEY DISTRIBUTION
    • Trisha's Hand notes on- Chapter 7- Public Key Distribution
      • Trisha's Hand notes on- Chapter 7- Public Key Distribution
    • Wireless Authentication and Key Generation
    • Recorded Link of class on key distribution
      • Recorded Link of class on key distribution
    • Research on Key distribution
      • Research on Key distribution
  • Lecture 10: RSA Algorithm
    • PowerPoint Slide of Chapter 9: Public Key cryptography & RSA
      • PowerPoint Slide of Chapter 9: Public Key cryptography & RSA
    • The Practice of RSA Algorithm
    • NETWORK SECURITY - RSA ALGORITHM
    • Trisha's Hand notes on- Chapter 9- Public Key cryptography & RSA
      • Trisha's Hand notes on- Chapter 9- Public Key cryptography & RSA
    • Assignment on RSA Algorithm
      • Assignment on RSA Algorithm
    • Recorded Link of Class on RSA Algorithm
      • Recorded Link of Class on RSA Algorithm
    • Research Article on RSA Algorithm
  • Lecture 11: Key Management
    • PowerPoint Slide of Chapter 10: Key Management
      • PowerPoint Slide of Chapter 10: Key Management
    • Public Key Distribution - Public Key Authority and Public Key Certificate
    • Recorded Link of Class on public key authority
      • Recorded Link of Class on public key authority
    • Trisha's Hand notes on- Chapter 10- Key Management Document
      • Trisha's Hand notes on- Chapter 10- Key Management Document
    • X.509 AUTHENTICATION SERVICE PART 1 - NETWORK SECURITY
    • Research on Digital signature
    • The Key authority - secure key management
      • The Key authority - secure key management
  • Lecture 12: Diffie Hellman Key exchange algorithm
    • PowerPoint Slide chapter 10: Diffie Hellman Algorithm
      • PowerPoint Slide chapter 10: Diffie Hellman Algorithm
    • Trisha's Hand notes on- Chapter 10- Diffie Hellman Algorithm
      • Trisha's Hand notes on- Chapter 10- Diffie Hellman Algorithm
    • Research article on Diffie Hellman Algorithm
      • Research article on Diffie Hellman Algorithm
    • Recorded Link of Class on Diffie Hellman Algorithm
      • Recorded Link of Class on Diffie Hellman Algorithm
    • NETWORK SECURITY - DIFFIE HELLMAN KEY EXCHANGE ALGORITHM
    • Mathematical Practice on Diffie Hellman Key Exchange Algorithm
    • Assignment on Diffie Hellman key exchange algorithm
  • Lecture 13: Man in the Middle attack
    • NETWORK SECURITY - TYPES OF AUTHENTICATION (Message Encryption, MAC, Hash Functions)
    • PowerPoint Slide chapter 10: Man in the Middle attack
      • PowerPoint Slide chapter 10: Man in the Middle attack
    • Recorded Link of class on man-in-the middle attack
      • Recorded Link of class on man-in-the middle attack
    • What Is A Man-in-the-Middle Attack?
    • Formulation on Man-in-the Middle attack
    • Man-in-the-Middle Attacks - NS-video
  • Lecture 14: MAC ad Hash function
    • PowerPoint Slide chapter 11: MAC & Hash function
      • PowerPoint Slide chapter 11: MAC & Hash function
    • Trisha's Hand notes on- Chapter 11- MAC & Hash Function
      • Trisha's Hand notes on- Chapter 11- MAC & Hash Function
    • Recorded Link of class on hash function
      • Recorded Link of class on hash function
    • Message Authentication Code
      • Message Authentication Code
  • Lecture 15: SHA Algorithm
    • PowerPoint Slide chapter 12: SHA Algorithms
      • PowerPoint Slide chapter 12: SHA Algorithms
    • NETWORK SECURITY - SHA 512 (AUTHENTICATION ALGORITHM)
    • NETWORK SECURITY - MD5 ALGORITHM
  • Lecture 16 : Digital signatures
    • PowerPoint Slide chapter 13: Digital signatures & Authentication Protocols
      • PowerPoint Slide chapter 13: Digital signatures & Authentication Protocols
    • NETWORK SECURITY - DIGITAL SIGNATURE ALGORITHM (DSA)
    • Trisha's Hand notes on- Chapter 13: Digital Signature
      • Trisha's Hand notes on- Chapter 13: Digital Signature
  • Lecturer 17: Electronic Mail Security
    • PowerPoint Slide chapter 15: Electronic mail security
      • PowerPoint Slide chapter 15: Electronic mail security
    • NETWORK SECURITY - PGP (E-MAIL SECURITY)
    • Trisha's Hand notes on- Chapter 15: Electronic mail security
      • Trisha's Hand notes on- Chapter 15: Electronic mail security
    • NETWORK SECURITY - KERBEROS (AUTHENTICATION APPLICATION)
    • PGP Encryption
      • PGP Encryption
  • Lecture 18: IP Security
    • PowerPoint Slide chapter 15: IP Security
      • PowerPoint Slide chapter 15: IP Security
    • X.509 AUTHENTICATION SERVICE PART 2 - NETWORK SECURITY
    • NETWORK SECURITY - IP SECURITY PART 1 (AUTHENTICATION HEADER)
    • NETWORK SECURITY - IP SECURITY PART 2 (ENCAPSULATING SECURITY PAYLOAD)
  • Lecture 19: Firewall
    • PowerPoint Slide chapter 19: Firewall
      • PowerPoint Slide chapter 19: Firewall
    • How firewalls work | Network firewall security | firewall security | TechTerms
    • Firewalls and Network Security - Information Security
    • Firewall limitations - Software and Hardware - Disadvantages| Network Security | TechTerms
    • CHAPTER 12 FIREWALL Networking Basic
  • Skill Development
    • How to Design Cartoon Character in PowerPoint
    • Skill Development with GoEdu
      • Employability Skills [Part 1]: Improve Job Opportunities
      • Thinking in Object Oriented Programming: Basic Concept
      • Career Planning from News Media: Advanced Techniques
      • Creative Graphic Design and Freelancing
    • Language Learning with DJIT
      • Language Learning with DJIT
Useful Links
  • Home
  • About us
  • Products
  • Services
  • Legal
  • Contact us
About us


EMAIL ID:

admission@diit.edu.bd

support@diit.edu.bd

ADDRESS:

64/4 Lake circus, Kalabagan,
Dolphin Goli, Dhaka -1205

Connect with us
  • Contact us
  •  admission@diit.edu.bd
      •         +88 02 58151226        +880 1713493286        +880 1847140188
Follow us
Copyright © DIIT