EZ

Eduzan

Learning Hub

Back to tutorials

CYBER SECURITY

Lesson2025-12-16

Cyber Security Tutorial Roadmap

This roadmap provides a step-by-step learning path to understand Cyber Security concepts, technologies, laws, threats, and defenses. It is designed to build strong theoretical foundations, followed by

Open module>
Lesson2025-12-16

Introduction to Cyber Security

OSI Security Architecture The OSI Security Architecture is widely acknowledged on a global scale and offers a standardized framework for implementing security measures within organizations. It emphasi

Open module>
Lesson2025-12-16

Cyber Technology

Basics of Wi-Fi Wired networks transmit data through cables, while wireless networks use radio waves for communication. Ethernet is the most common example of a wired network, whereas W

Open module>
Lesson2025-12-16

Cyber Ethics

Trademarks Trademarks are symbols, words, or marks associated with goods or services, designed to help the public recognize and associate specific qualities or images with a product or service. They s

Open module>
Lesson2025-12-16

Cyber Crimes

Psychological Profiling in Cybersecurity Cybersecurity profiling involves protecting computer systems from individuals with malicious intent who aim to steal information or cause harm. To enhance prot

Open module>
Lesson2025-12-16

Prevention and Protection

Backup and Recovery As technology advances, most people rely on devices for work or entertainment, generating data continuously. Safeguarding this data is essential. With the increase in data volume,

Open module>
Lesson2025-12-16

Cyber Law

Information Technology Act, 2000 (India) The Information Technology Act, 2000, often referred to as the IT Act, is legislation enacted by the Indian Parliament on 17th October 2000. This act draws ins

Open module>
Lesson2025-12-16

Cyber Investigators And Digital Forensics

Chain of Custody in Digital Forensics: Ensuring Integrity of Evidence The chain of custody represents the systematic process that tracks the custody, control, transfer, analysis, and disposition of ev

Open module>
Lesson2025-12-16

Cloud Security

Cloud Security Cloud computing, one of the most sought-after technologies today, has become integral for organizations of all sizes. With various cloud deployment models available, services can be tai

Open module>
Lesson2025-12-16

Cyber Crime Techniques

Worms, Viruses The Threat Computer systems can be targeted by various attacks, including viruses, worms, and hacking attempts. These threats can lead to system crashes, the theft and misuse of sensiti

Open module>
Lesson2025-12-16

Cybersecurity Objectives

Cyber Security Metrics Metrics serve as valuable tools to support decision-making, improve performance, and enhance accountability. A cybersecurity metric, for instance, tracks the number of reported

Open module>
Lesson2025-12-16

Classical Encryption Techniques

Symmetric Cipher Model Symmetric Encryption is one of the oldest and simplest forms of encryption. It operates using a single key for both encrypting and decrypting data, which is why it is also calle

Open module>
Lesson2025-12-16

More on Symmetric Ciphers

Double DES and Triple DES As we know, the Data Encryption Standard (DES) uses a 56-bit key to encrypt plaintext, making it vulnerable to being cracked with modern technology. To address this

Open module>
Lesson2025-12-16

Advanced Encryption Standard

Difference between AES and DES ciphers Advanced Encryption Standard (AES) is a highly trusted encryption algorithm used to secure data by converting it into an unreadable format without the

Open module>
Lesson2025-12-16

Introduction to Number Theory

Fermat’s Little Theorem Fermat’s Little Theorem is a fundamental theorem in number theory that states:If p is a prime number and a is any integer not divisible by p, the

Open module>
Lesson2025-12-16

Message Authentication Requirements

Message Authentication Requirements Data is susceptible to various forms of attacks, including threats related to message authentication. This issue arises when the recipient lacks any assurance regar

Open module>
Lesson2025-12-16

Key Management in Cryptography

Key Management In cryptography, distributing public and private keys between the sender and receiver can be a tedious task. If a third party (such as an attacker or eavesdropper) gains access to the k

Open module>
Lesson2025-12-16

Hash and MAC Algorithms

Secure Hash Functions SHA-1, or Secure Hash Algorithm 1, is a cryptographic algorithm that generates a 160-bit (20-byte) hash value from an input. This hash value, often referred to as the message dig

Open module>
Lesson2025-12-16

Digital Signatures and Authentication Protocols

Digital Signatures and Certificates SHA-1, or Secure Hash Algorithm 1, is a cryptographic algorithm that generates a 160-bit (20-byte) hash value from an input. This hash value, often referred to as t

Open module>
Lesson2025-12-16

Authentication Applications

Digital Signatures and Certificates Kerberos provides a centralized authentication mechanism that enables users to authenticate to servers and vice versa. It employs an Authentication Server and a dat

Open module>
Lesson2025-12-16

Electronic Mail Security

Digital Signatures and Certificates Introduction to PGPIn 2013, following the public exposure of the NSA (United States National Security Agency) surveillance scandal, people increasingly sought servi

Open module>
Lesson2025-12-16

Risk Management and Compliance in Cyber Security

Introduction Risk Management and Compliance are critical components of Cyber Security that focus on identifying, analyzing, reducing, and monitoring risks, while ensuring that an organization follows

Open module>
Lesson2025-12-16

IP Security

IP Security Overview What is IP Security (IPSec)? IP Security (IPSec) is a suite of protocols designed to secure communications over a network by enforcing encryption and authentication mechanisms. Th

Open module>
Lesson2025-12-16

Web Security

Web Security Considerations Web Security: Safeguarding Data in the Digital Era Web Security ensures the safety of data across the internet, within networks, or during online transfers. It is essential

Open module>
Showing 24 of 27 lessons