There are no items in your cart
Add More
Add More
| Item Details | Price | ||
|---|---|---|---|
Language: English
Instructors: Vidyalankar
Max Viewing Hours: 30 Hours
Why this course?
Third Year Engg (SEM VI) -May 26
Includes :
FULL Video lectures by Vidyalankar's Expert Faculty
Notes : Well-organized, concise notes covering critical concepts.
Graded Questions (GQ) : Carefully selected practice questions graded by difficulty, designed to enhance problem-solving abilities.
EQ (Univ. Exam Questions - Classified Chapter wise).
| Syllabus | |||
| Module 1 : Introduction : Number Theory and Basic Cryptography | |||
| Video 1_Module 1-Introduction - Number Theory and Basic Cryptography | |||
| Video 2_Module 1- Number Theory and Basic Cryptography | |||
| Video 3_Module 1-1.2 Number Theory and Basic Cryptography | |||
| Video 4_Module 1-1.2 Number Theory and Basic Cryptography | |||
| Printed Notes : Module 1 Introduction : Number Theory and Basic Cryptography | |||
| EQ : Module 1 Introduction : Number Theory and Basic Cryptography | |||
| Module 2 : Symmetric and Asymmetric key Cryptography and key Management | |||
| Video 1_Module 2-2.3 Symmetric Key Distribution | |||
| Video 2_Module 2-2.3 Symmetric Key Distribution | |||
| Video 3_Module 2-2.1 Block cipher principles | |||
| Video 4_Module 2-2.1 Block cipher principles | |||
| Printed Notes : Module 2 Symmetric and Asymmetric key Cryptography and key Management | |||
| EQ : Module 2 Symmetric and Asymmetric key Cryptography and key Management | |||
| Module 3 : Cryptographic Hash Functions | |||
| Video 1_Module 3- Cryptographic Hash Functions | |||
| Video 2_Module 3- Cryptographic Hash Functions | |||
| Printed Notes : Module 3 Cryptographic Hash Functions | |||
| EQ : Module 3 Cryptographic Hash Functions | |||
| Module 4 : Authentication Protocols & Digital Signature Schemes | |||
| Video 1_Module 4 Authentication Protocols & Digital Signature Schemes | |||
| Printed Notes : Module 4 Authentication Protocols & Digital Signature Schemes | |||
| EQ : Module 4 Authentication Protocols & Digital Signature Schemes | |||
| Module 5 : Network Security and Applications | |||
| Video 1_Module 5- Network Security and Applications | |||
| Video 2_Module 5- Network Security and Applications | |||
| Video 1_Module 5 & 6- Network Security and System Security (For AI & DS) | |||
| Printed Notes : Module 5 Network Security and Applications | |||
| EQ : Module 5 Network Security and Applications | |||
| Module 6 : System Security | |||
| Video 1_Module 5 & 6- Network Security and System Security (For AI & DS) | |||
| Printed Notes : Module 6 System Security | |||
| EQ : Module 6 System Security | |||
| Latest Mumbai University Paper : Dec. '24 | |||
After successful purchase, this item would be added to your courses.You can access your courses in the following ways :