Information security in telecommunications systems
Dates - from March 29 to April 09
№ |
Section names |
Watch |
|||
Total |
Lectures |
Practically. |
|||
1 |
Fundamentals of cryptography. The substitution method. The permutation method. |
4 |
4 |
- |
|
2 |
Algorithms with a symmetric cryptographic key. The DES encryption standard. AES encryption standard. |
12 |
8 |
4 |
|
3 |
Public-key algorithms. The RSA algorithm. |
4 |
4 |
- |
|
4 |
Digital signatures |
4 |
4 |
- |
|
5 |
Managing public keys. Certificates. X. 509. |
4 |
4 |
- |
|
6 |
IPsec connection protection. Firewalls. |
12 |
6 |
6 |
|
|
Virtual private networks. Security in wireless networks. |
12 |
6 |
6 |
|
7 |
Authentication Protocols |
4 |
4 |
- |
|
8 |
Authentication Protocols |
4 |
4 |
- |
|
9 |
Protection of information on the Internet. DNS protection. Secure Sockets Layer (SSL) protocol. Steganography. |
12 |
8 |
4 |
|
|
TOTAL |
72 |
52 |
20 |