Computer Skills

 This course deals with statement theory in general, tree building algorithms, mechanisms for obtaining optimal statement and fault resistance within built trees, which is a major part of university programming competitions. In the second part of the course, attacks on computer networks are studied, classified and their impact on networks, as well as requirements for security, encryption such as symmetric encryption algorithms (secret key): DES, RC4, AES and asymmetric encryption algorithms such as RSA. It also covers the fundamentals of data integrity, authentication and access control such as Hash, MD5, SHA methods and algorithms, data source authentication and message authentication encodings: MACs, HMAC/MD5, and mechanisms for generating, distributing and managing cryptographic keys.

Attachement Files

powered by Syrian Monster - Web Service Provider - All Rights Reserved 2024