Digital Security Through C
The Real C Programming
NOTE:
If you cannot pay using Credit Card, use any of these easy ways to pay course fees:
1. UPI:
|
2. NetBanking:
Account Name: Kanetkar's ICIT Pvt. Ltd.
|
Your Instructor
Through his books and Quest Video Courseware DVDs on C, C++, Data Structures, VC++, .NET, Embedded Systems, etc. Yashavant Kanetkar has created, moulded and groomed lacs of IT careers in the last two and half decades. His books and Quest online courses have made a significant contribution in creating top-notch IT manpower in India and abroad. His books are globally recognized and millions of students / professionals have benefited from them. Yashavant's books have been translated into Hindi, Gujarati, Japanese, Korean and Chinese languages. Many of his books are published in India, USA, Japan, Singapore, Korea and China.
Yashavant is a much sought after speaker in the IT field and has conducted seminars/workshops at TedEx, IITs, RECs and global software companies. He has been honored with the prestigious “Distinguished Alumnus Award” by IIT Kanpur for his entrepreneurial, professional and academic excellence. This award was given to top 50 alumni of IIT Kanpur who have made significant contribution towards their profession and betterment of society in the last 50 years. In recognition of his immense contribution to IT education in India, he has been awarded the "Best .NET Technical Contributor" and "Most Valuable Professional" awards by Microsoft for 5 successive years.
Yashavant holds a BE from VJTI Mumbai and M.Tech. from IIT Kanpur. Yashavant's current affiliations include being a Director of KICIT Pvt. Ltd. He can be reached at [email protected].
Course Curriculum
-
Start01. Security In Digital Age (24:59)
-
Start02. Virtual Box Installation (41:51)
-
Start03. Virtual Box Using Readymade VM (21:12)
-
Start04. Virtual Box Jdk And Netbeans Installation (16:20)
-
Start05. Getting Started With Programs (19:35)
-
Start06. OpenSSL And BIO (18:35)
-
Start07. Using The BIO Library (32:31)
-
Start08. Data Representation (24:24)
-
Start09. Data Encoding And Decoding (17:22)
-
Start10. Data Integrity (22:04)
-
Start11. MD5 Checksum (23:49)
-
Start12. Cryptography Schemes (27:01)
-
Start13. Transposition, Digraph And Homophonic Ciphers (19:13)
-
Start14. Symmetric Cryptography (21:04)
-
Start15. DES (25:15)
-
Start16. Triple DES (32:11)
-
Start17. Rijndael Algorithm (32:27)
-
Start18. AES Encryption (25:32)
-
Start19. AES Decryption (25:20)
-
Start20. Asymmetric Cryptography (25:41)
-
Start21. How PKCS Works (25:41)
-
Start22. RSA Signing (21:51)
-
Start23. RSA Verification (14:54)
-
Start24. PKCS In Real World (21:57)
-
Start25. Digital Certificates (24:30)
-
Start26. Practical ICAN Using Cryptography (24:51)
-
Start27. Establishing Certificate Authority (24:35)
-
Start28. Introduction To SSL (23:31)
-
Start29. SSL Client (20:20)
-
Start30. SSL Server (20:59)
-
Start31. Buffer Overflow Attacks (23:14)
-
Start32. Security Threats (23:18)
-
Start33. Anti-Viral Program (21:07)
-
Start34. Virus Myths And Facts (20:15)
-
Start35. FAT File System Anatomy (17:49)
-
Start36. Disk Based Viruses (18:06)
-
Start37. Information Hiding (28:02)
-
Start38. Steganography Techniques (29:44)
-
Start39. Image Stealth Technique (17:26)
-
Start40. Security Quiz (19:42)