Self-Evaluation
On
many occasions I had used MD5, AES, and Triple-DES but was always interested in
learning in depth how these algorithms work. Kerberos, IPsec, and SSL which we
use almost every day got more meaning and understanding. Now I can understand
what is going on when I perform certain security related operation on computer or automated
systems.In addition, I have begin to understand protocols/algortihms which gets done in the background without users knowledge.
I
also came across few interesting topics like blowfish and elliptic curve. I
liked the lab work where we got firsthand experience of creating a certificate
and sending signed /encrypted messages. Exposure to PGP, SMIME and Digital
signatures in details was particularly useful.
Hash functions, symmetric/asymmetric key encryption, Diffie Hellman key
exchange and RSA gave me deeper understand and a feel for what will happen next
in terms of protocol and algorithms when I use web based application or in
general security part of the application.
Although I have come across number of security
threats, virus, spywares, rootkits, Trojan-horse and have used firewalls, antivirus
and different prevention techniques now I got to explore more on malwares and
update myself with current threats and prevention / removal techniques. How we
can use Bastion host increased the knowledge of how we can prevent the attacks.
Few years back had worked on SNMP managers, Agent, Personal firewalls, sniffers,
etc. during which had come across all different versions of SNMP, security
features, filtering rules, prioritizations, etc. it was good to be refreshed.
In the assignments where we had questions about different tools increased the
awareness, got to learn many more new tools during this process.
Wiki
and Portfolio was particularly useful, it gave me an opportunity to fulfill all
my curiosity which was required for this course. I happen to read more about Kerberos, AES, Triples-DES, RADIUS, TACACS+, current hash algorithms like Blake,Gr0stl and JH. Exploring and understanding SHA-3 Zoo, wireless security, application security, firewalls, different security architecture, etc was fun. It made me up to date with current
network security and with the help of Network security course I was able to
understand what is going on!
Overall,
I enjoyed every lecture video, transcripts, assignments, lab work, portfolio
and wiki. It appears now I can enjoy and appreciate most of the security
modules and applications which we come across during our everyday life. Of
course curiosity never ends, with the help of what we have learned in this
course we can keep expanding our knowledge at a faster rate.