Welcome to Asecuritysite.com
Home
Index
Cipher
Blogs
IP
IDS
Magic
Net
Cisco
Cyber
Test
Fun
Subj
About
Lectures
[
Back]
[
Home
] This is a site a demo site for associated lectures:
Zero Knowledge
Zero Knowledge Proof and Diffie Hellman
Zero-Knowlege Proof: Fiat-Shamir
Zero-knowledge proof using crypto pairing
Introduction to zkSnarks
Oblivious Transfer
Pedersen Commitment
A Fair and Honest Voting System
WPA-3: SAE and Dragonfly
Homomorphic
Homomorphic Encryption
Partially Homomorphic Encryption: RSA
Homomorphic Encryption(Multiply, Divide and Add) with ElGamal
Implementation of Homomorphic Encryption: Paillier
Homomorphic Encryption: Adding Numbers Securely (using HA and FA)
Public Key Encryption With Fully Homomorphic Encryption
Simple Fully Homomorphic Cipher for a 2-bit Adder
(Un)linkable IDs using Homomorphic Encryption
Identifying Random Bits in Ciphered Values in Homomorphic Encryption
Lattice/LWE
Lattice Crypto: Ring LWE with Key Exchange
Public Key Encryption using Learning With Errors(LWE)
Python and Crypto: Learning With Errors and Ring Learning With Errors
Outline
1 Introduction to Security
2 Principles of IDS
3 Principles of Encryption
Principles of Software Encryption
4 Principles of Authentication
5 Principles of Network Security
Principles of Network Security (Part 2)
6 Principles of Software Security
Principles of Software Security Part 2
Principles of Software Security Part 3
Principles of Wireless Security
Principles of Digital Forensics (Part 1)
Principles of Digital Forensics (Part 2)
- Code/Live Forensics
- Small Block Forensics
7 Principles of Risk
8 Principles of Threat Analysis
9 Principles of Network Forensics
10 Principles of Data Hiding and Obfuscation
11 Web Infrastructures
12 Cloud Computing
- EC2 S3 Commands
- EC2 Tools
- Real-life demo of instance creation
- EC2 AMI
- Creating Linux image demo (Lab 10)
13 Codes and Secrets
14 Malware Analysis
15 Advanced Digital Forensics
16 Advanced Network Forensics
Digital Forensics Snippets
MP3 File Forensics
GIF File Forensics
JPEG File Forensics
ZIP File Forensics
PNG File Forensics
RTF File Forensics
XLS File Forensics
Web Page Network Forensics
Network Forensics Snippets
Web page
Scan
Spoof
NMAP
Hydra Telnet
Hydra FTP
Hping FIN
Hping UDP
Hping Syn
Google
FTP
DNS
Security Snippets
Intro Crypto 1
Intro Crypto 2
Advanced Crypto
One-Time Password
Secret Splitting
ElGamal
Code talkers
EX-OR
Polybius
ASCII, Base-64, and so on
DES
3DES
Blowfish
Blowfish with CBC
Bcrypt
MD5, SHA-1 and SHA-2
SHA-3
MD2 and MD4
AES/CCM
Playfair
Digital Investigator
Introduction
Ethernet, IP and TCP
HTTP, FTP and DNS
ARP and ICMP
SMTP, POP-3 and IMAP
SSL and TLS
Intro to IDS
IDS Detection Examples
IDS Detection Examples
Intro to Pen Testing
Pen Testing: NESSUS
Pen Testing: Enumeration/User Accounts
IP Snippets
IP Classifications
IP Host/Network Parts
IP Host/Network Addresses
IP Subnets
IP Browser Details
Telecommunciations
Introduction
Signals
Multiplexing
Digital Pulses
Error Coding
Compression
VMware Cloud
Power CLI
Create VM from ISO
Installing Vyatta
Accessing Napier Cloud
Vyatta Firewall for Routing
Vyatta Firewall and Protection
ASP.NET MVC
Integrating Console
Combobox with Postback
Integrating iframes
Actions and Partial Views
Windows Azure: Deploying and MVC Project to Azure with SDF database
Filling a grid
Integrating equations
Integrating charts
Cipher Challenges
Scrambled Alphabet
Homophonic Cipher
Navajo Cipher
Bifid Cipher
Straddling Cipher
Dvorak Cipher
Rot13 Cipher
Atbash Cipher
Polybius Cipher
Bacon Cipher
Vigenère Cipher
ADFGVX Cipher
Morse Cipher
Pigpen Cipher
Bible Cipher
Hex Cipher
Rail Cipher
Mary's Cipher
Cracking a Scrambled Alphabet Cipher
Cracking MD5
.NET
.NET 3.x
.NET Remoting
- .NET Remoting Tutorial
- .NET Remoting Tutorial Part 1
- .NET Remoting Tutorial Part 2
- .NET Remoting Tutorial Part 3
- .NET Remoting Tutorial Part 4
.NET Workflow
.NET WCF
.NET WPF
- .NET WPF Tutorial 2 Demo
.NET Cardspace
MVC Part 1: Actions and PartialViews
MVC Part 2: Integrating inframes
.NET Spreadsheets to XML
Wireless
Wireless Antennas
Wireless Fundamentals
Wireless Radio Wave Fundamentals (HD)
Wireless RF
Wireless Security
Wireless Next Generation
Cisco Switching
VLANs
QoS
MLS
Avail
STP
CEH
1: Business Aspects of Pen Testing
2: Technical Foundations of Hacking
3: Footprinting and Scanning
4: Enumeration and System Hacking
5: Linux and Automated Security Assessment Tools
6: Trojans and Backdoors
Amazon Cloud
AWS (Ubuntu)
EC2
AWS (AMI)
AWS (LAMP)
Azure Cloud
Setting up Web Service
Setting up VM
SQL Database integration
SQL Database import
SDF database integration with Azure
SQL
SQL 1
SQL 2
SQL 3
SQL 4
Others
PIX/ASA
CCNA (Introduction)
Digital Certificates
Hping (demo)
Hydra (demo)
IDS Snort (demo)
Nessus (demo)
Amazon S3
SNMP
SSH Testing
TCP Dump
Tripwire
VCentre 5 Demo
Security Scan with Nessus
Cross-scripting
Demo Expired Cert
Demo Exporting Cert
Demo Browser
Threat Analysis
Demo of Nessus
Cross scripting example
SQL examples
IDS detecting ping and port scan
Snort example using ProfSIMs
Hydra vulnerability scanning
Hping vulnerability scanning
Lab Demo Part 1
Lab Demo Part 2
Lab Demo Part 3
Lab Demo Part 4
Eve The Magician
Seven Crypto Tricks
RSA Crack
Tunnel Crack
Chosen Cipher
Bleichenbacher's attack