Skip to content
0091-484-2540360
[email protected]
Kalamassery, Kochi, Ernakulam
Search for:
TOP MENU
Primary Menu
HOME
ABOUT US
Albertian Institute of Science & Technology
Instructors
Annual Appraisal
Research & Consultancy @ AISAT
ALL COURSES
Departments
AI & ML Courses
ASH Courses
CE Courses
CSE Courses
ECE Courses
EEE Courses
ME Courses
First Year Courses
Applied Science & Humanities Courses
Engineering Chemistry Courses
Engineering Mathematics Courses
Engineering Physics Courses
English Courses
General Courses
General Courses
IIC Orientations
Physical Education Training
Placement Training
Research Orientation
Soft Skill Development
CONTACT US
PROFILE
LOGIN
Main Site
Search for:
Main Site
0091-484-2540360
[email protected]
Kalamassery, Kochi, Ernakulam
Home
All Courses
Computer Science & Engineering
CST332 Foundations of Security in Computing
CST332 Foundations of Security in Computing
Curriculum
5 Sections
30 Lessons
10 Weeks
Expand all sections
Collapse all sections
Module 1
Modular Arithmetic
9
3.1
Integer Arithmetic-Divisibility
3.2
Euclidean Algorithm with Problems
3.3
Extended Euclidean Algorithm with Problems
3.4
Linear Diophantine Equations
3.5
Modular Arithmetic
3.6
Algebraic Structures
3.7
Order of an element in a Group
3.8
Ring-Field-GF(2)
3.9
Field-GF(2^n)
Module 2
Prime numbers and Factorization
5
4.1
Prime numbers and Prime power factorization
4.2
Fermat and Mersenne primes
4.3
Fermat’s Theorem
4.4
Euler’s theorem
4.5
Primality testing
Module 3
Linear Congruence, Primitive Roots and Elliptic Curve Arithmetic
7
5.1
Linear Congruence
5.2
Chinese Remainder Theorem (CRT)
5.3
Congruence with a prime-power modulus
5.5
Pseudo primes and Carmichael numbers
5.7
Primitive Roots
5.8
Discrete Logarithms
5.9
Elliptic curve arithmetic
Module 4
5
6.1
Threats, Vulnerabilities, Controls
6.2
Browser attack types
6.3
Web attacks targeting users
6.4
Email attack types
6.5
Non Malicious programming oversights and Malware
Module 5
4
7.1
Security in operating system
7.2
Security in design of operating system
7.3
Security requirements of database
7.5
Database Disclosure
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content