Dr. Sami Zhioua, ICS 444: Lecture 03: Advanced Encryption Standard (AES)
This is the third lecture of the course ICS 444: Computer & Network Security offered at King Fahd University of Petroleum and Minerals (KFUPM). This lecture ...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
This is the third lecture of the course ICS 444: Computer & Network Security offered at King Fahd University of Petroleum and Minerals (KFUPM). This lecture was presented in the Spring 2016 semester (KFUPM term: 152).
This course is an introduction to computer and network security; Security services: confidentiality, integrity, availability, accountability; Hacker techniques and attack types; Public and private key encryption; Authentication; Digital signature; User identification and access control; Computer viruses, Trojans and worms; Risk management and analysis; Information security process; Internet security: security protocols such as IPSec, SSL, TLS, email and web security; Security technologies and systems: Firewalls, VPN and IDS.
The course is offered by Dr. Sami Zhioua. He is an Assistant Professor at the Information and Computer Science Department (ICS) at King Fahd University of Petroleum and Minerals (KFUPM). Learn more about Dr. Zhioua here: http://faculty.kfupm.edu.sa/ICS/zhioua/
Recorded on: 04/02/2016
Video Information
Views
384
Total views since publication
Likes
4
User likes and reactions
Duration
31:51
Video length
Published
Mar 15, 2016
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Introduction to computer and network security #Security services #confidentiality #integrity #availability #accountability #Hacker techniques and attack types #Public and private key encryption #Authentication #Digital signature #User identification and access control #Computer viruses #Trojans and worms #Risk management and analysis #Information security process #Internet security #IPSec #SSL #TLS #email and web security #Security technologies and systems #Firewalls #VPN #IDS #Sami Zhioua
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.