Ashok Katariya
ผลงานที่ได้รับความนิยมสูงสุด
ชื่อเรื่อง : Information System |
คำอธิบาย : BLOCK I: 1.1 LEARNING OBJECTIVES; 1.2 INTRODUCTION TO OSI MODEL; 1.3 SENDING DATA VIA OSI MODEL; 1.4 DIFFERENT TYPES OF PROTOCOLS; 1.5 TCP/IP ARCHITECTURE; 1.6 ADDRESSING; 1.7 PRIVATE INTERNETS; 1.8 CLASSLESS INTER-DOMAIN ROUTING (CIDR); 1.9 DOMAIN NAME SYSTEM; 1.10 THE HIERARCHICAL NAMESPACE; 1.11 FULLY QUALIFIED DOMAIN NAMES (FQDNs) ; 1.12 COUNTRY DOMAINS; 1.13 MAPPING DOMAIN NAMES TO IP ADDRESS; 1.14 INTERNET PROTOCOL (IP); 1.14.3 IP Routig Table; 1.15 INTERNET CONTROL MESSAGE PROTOCOL (ICMP); 1.16 TRANSMISSION CONTROL PROTOCOL; 1.17 USER DATAGRAM PROTOCOL; 1.18 PORTS AND SOCKETS; 1.19 INTERNET PROTOCOLS; 1.20 HOW INTERNET EMAIL WORKS; 1.21 FTP; 1.22 SSH (SECURE SHELL); 1.23 SSL; 1.24 SUMMARY; 1.25 CHECK YOUR PROGRESS; 1.26 ANSWERS TO CHECK YOUR PROGRESS; 1.27 MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 WHAT IS CRYPTOGRAPHY? ; 2.3 CRYPTOGRAPHY AND SECURITY; 2.4 CRYTOGRAPHIC ALGORITHMS; 2.5 PASSWORD HASHES; 2.6 SYMMETIC CRYPTOGRAPHIC ALGORITHMS; 2.7 ASYMMETRIC CRYPTOGRAPHIC ALGORITHMS; 2.8 RSA; 2.9 USING CRYPTOGRAPHY; 2.10 HARDWARE ENCRYPTION; 2.11 DIGITAL CERTIFICATES; 2.12 PUBLIC KEY INFRASTRUCTURE (PKI); 2.13MANAGINGPKI; 2.14 KEY MANAGEMENT; 2.15 TRANSPORTATION ENCRYPTION ALGORITHMS; 2.16 IP SECURITY (IPSEC); 2.17 SUMMARY; 2.18 CHECK YOUR PROGRESS; 2.19 ANSWERS TO CHECK YOUR PROGRESS; 2.20 MODEL QUESTIONS; 3.1 LEARNING OBJECTIVES; 3.2 INTRODUCTION; 3.3 TYPES OF PENTESTING; 3.4 VULNERABILITY RESEARCH AND TOOLS; 3.5 ETHICS AND THE LAW; 3.6 HACKING; 3.7 PHASES OF PENETRATION TESTING; 3.8 HACKING TOOLS AND TECHNIQUES; 3.9 SUMMARY; 3.10 CHECK YPOR PROGRESS; 3.11 ANSWERS TO CHECK YOUR PROGRESS; 3.12 MODEL QUESTIONS; 4.1 LEARNING OBJECTIVES; 4.2 INTRODUCTION; 4.3 NETWORK SECURITY CONCEPTS; 4.4 SECURITY MANAGEMENT; 4.5 E-MAIL SECURITY; 4.6 WEB APPLICATION SECURITY; \\\\\\\\4.7 INFRASTRUCTURE SECURITY; 4.8 SUMMARY; 4.9 CHECK YOUR PROGRESS; 4.10 ANSWERS TO CHECK YOUR PROGRESS; 4.11 MODEL QUESTIONS; BLOCK II: 1.1 LEARNING OBJECTIVES; 1.2 INTRODUCTION; 1.3 THE PURPOSE OF CRYPTOGRAPHY; 1.4 HISTORY OF CRYPTOGRAPHY; 1.5 CIPHER; 1.6 DETECTION AND CRYPTANALYSIS; 1.7 MORDERN ENCRYPTION METHODS; 1.8 KEY SIZE AND VULNERABILITY; 1.9 KEY MANAGEMENT; 1.10 SUMMARY; 1.11 CHECK YOUR PROGRESS; 1.12 ANSWERS TO CHECK YOUR PROGRESS; 1.13 MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 INTRODUCTION; 2.3 TYPES OF CRYPTOGRAPHIC ALGORITHMS; 2.4 FUNER DETAILS OF DES, BREAKING DES, AND DES VARIANTS; 2.5 PUBLIC-KEY CRYPTOGRAPHY; 2.6 DATA INTEGRITY ALGORITHMS; 2.7 WHY THREEENCRYPTION TECHNIQUES? ; 2.8 THE SIGNIFICANCE OF KEY LENGTH; 2.9 SUMMARY; 2.10 CHECK YOUR PROGRESS; 2.11 ANSWERS TO CHECK YOUR PROGRESS; 2.12 MODEL QUESTIONS; 2.13 FURTHER READINGS; 3.1 LEARNING OBJECTIVES; 3.2 INTRODUCTION; 3.3 KEY GENERATION; 3.4 KEY DISTRIBUTION; 3.5 SYMMETRIC KEY DISTRIBUTION USING ASYMMETRIC ENCRYPTION; 3.6 ENTERPRISE KEY AND CERTIFICATE MANAEMENT (EKCM) ; 3.7 SUMMARY; 3.7 CHECK YOUR PROGRESS; 3.8 ANSWERS TO CHECK YOUR PROGRESS; 3.9 MODEL QUESTIONS; 4.1 LEARNING OBJECTIVES; 4.2 INTRODUCTION; 4.3 METHODS OF ATTACK ON CRYPTOGRAPHIC SYSTEMS; 4.4 INTERNET SECURITY APPLICATIONS; 4.5IPSEC; 4.6E-MAIL SECURITY APPLICATIONS; 4.7 PRETTY GOOD PROVACY (PGP); 4.8 SUMMARY; 4.9 CHECK YOUR PROGRESS; 4.10 ANSWERS TO CHECK YOUR PROGRESS; 4.11 Model Questios; BLOCK III: 1.1 LEARNING OBJECTIVES; 1.2 INTRODUCTION; 1.3 INFORMATION GATHERING TECHNIQUES; 1.4 SOURCES OF INFORMATION GATHERING; 1.5 ACTIVE INFORMATION GATHERRING; 1.6 PASSIVE INFORMATION GATHERING; 1.7 ATTACK SCENARIO; 1.8 ENUMERATING SNMP; 1.9 DETECTING LOAD BALANCERS; 1.10 BYPASSING CLOUDFLARE PROTECTION; 1.11 INTELLIGENCE GATHERING USING SHODAN; 1.12 SUMMARY; 1.13 CHECK YOUR PROGRESS; 1.14 ANSWERS TO CHECK YOUR PROGRESS; 1.15 MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 INTRODUCTION; 2.3 HOST DISCOVERY; 2.4 SCANNING FOR OPEN PORTS AND SERVICES; 2.5 ANONYMOUS SCAN TYPES; 2.6 SERVICE VERSION DETECTION; 2.7 OS FINGERPRINTING; 2.8POF; 2.9 ADVANCED FIREWALL/IDS EVADING TECHNIQUES; 2.10 TIMING TECHNIQUE; 2.11 SOURCE PORT SCAN; 2.12 SPECIFYING AN MTU; 2.13 SENDING BAD CHECKSUMS; 2.14 DECOYS; 2.15 ZENMAP; 2.15 SUMARY; 2.16 CHECK YOUR PROGRESS; 2.17 ANSWERS TO CHECK YOUR PROGRESS; 2.18 MODEL QUESTIONS; 3.1 LEARNING OBJECTIVES; 3.2 INTRODUCTION; 3.3 SYSTEM HACKING; 3.4 PASSIVE ONLINE ATTACKS; 3.4.1 Packet Siffig; 3.5 ACTIVE ONLINE ATTACKS; 3.6 PASSWORD HASHING; 3.7 OFFLINE ATTACKS; 3.8 DISTRIBUTED NETWORK ATTACKS; 3.9 OTHER OPTIONS FOR OBTAINING PASSWORDS; 3.10 AUTHERNTICATION ON MICROSOFT PLATFORM; 3.11 PRIVILEGE ESCALATION; 3.12 PLANTING A BACKDOOR; 3.13 COVERING YOUR TRACKS; 3.14 SUMMARY; 3.15 CHECK YOUR PROGRESS; 3.16 ANSWERS TO CHECK YOUR PROGRESS; 3.17 MODEL QUESTIONS; 4.1 LEARNING OBJECTIVES; 4.2 INTRODUCTION; 4.3 ACQUIRING SITUATION AWARENESS; 4.4 MAINTAINING ACCESS; 4.5 DEEP DIVE (MAINTAINING ACCESS) ; 4.6 SUMMARY; 4.7 CHECK YOUR PROGRESS; 4.8 ANSWERS TO CHECK YOUR PROGRESS; 4.9 MODEL QUESTIONS |
คำสำคัญ : Information System, Post-Graduate Diploma in Cyber Security, Cyber Security, Information Communication Technology |
ผู้สร้างสรรค์/ผู้แต่ง/เจ้าของผลงาน : Charanjeet Singh Chawla |
เจ้าของผลงานร่วม : Ashok Katariya, Uttarakhand Open University, Commonwealth Educational Media Centre for Asia |
สื่อสำหรับบุคคลประเภท : ครู / อาจารย์, นักเรียน / นักศึกษา, ทั่วไป, ผู้ปกครอง |
ระดับชั้น : ปริญญาตรี , ปริญญาโท, ปริญญาเอก, การศึกษาตามอัธยาศัย |
สาขาวิชาของสื่อ : วิทยาศาสตร์, การงานอาชีพและเทคโนโลยี |
ลักษณะของสื่อ : Textbooks, หนังสือ |
ผลงานทั้งหมด
2
ผู้เข้าชม
532
ดาวน์โหลด
1,089
ผลงานที่ได้รับความนิยมสูงสุด 5 อันดับ | |
---|---|
Information System | 276 |
Information System | 245 |
ผลงาน 5 อันดับล่าสุด | |
---|---|
Information System | 4 สิงหาคม 2561 |
Information System | 4 สิงหาคม 2561 |
ผลงานทั้งหมด | ||||
---|---|---|---|---|
# | ชื่อเรื่อง | ผู้เข้าชม | ดาวน์โหลด | # |
1 | Information System | 276 | 631 | |
2 | Information System | 245 | 458 |