The course will start with an introduction to the security concepts and how the data sent over the network is threatened by illegal activities. This course will discuss how cryptographic algorithms can be used to secure data (confidentiality and integrity). Different protocols which have been developed for securing network communication, along with their weaknesses and strengths, will be discussed. This will enable the students to deploy existing protocols, and design new ones, to make data communication more secure. The students will also understand how different factors in a real-world setup can influence the choice of network security protocols.
Prerequisite Courses