Monday, 2025-02-03, 1:51 PM
Welcome, Guest | RSS
Login form
Search

Self-Evaluation

On many occasions I had used MD5, AES, and Triple-DES but was always interested in learning in depth how these algorithms work. Kerberos, IPsec, and SSL which we use almost every day got more meaning and understanding. Now I can understand what is going on when I perform certain security related operation on computer or automated systems.In addition, I have begin to understand protocols/algortihms which gets done in the background without users knowledge.

I also came across few interesting topics like blowfish and elliptic curve. I liked the lab work where we got firsthand experience of creating a certificate and sending signed /encrypted messages. Exposure to PGP, SMIME and Digital signatures in details was particularly useful.  Hash functions, symmetric/asymmetric key encryption, Diffie Hellman key exchange and RSA gave me deeper understand and a feel for what will happen next in terms of protocol and algorithms when I use web based application or in general security part of the application.

 Although I have come across number of security threats, virus, spywares, rootkits, Trojan-horse and have used firewalls, antivirus and different prevention techniques now I got to explore more on malwares and update myself with current threats and prevention / removal techniques. How we can use Bastion host increased the knowledge of how we can prevent the attacks. Few years back had worked on SNMP managers, Agent, Personal firewalls, sniffers, etc. during which had come across all different versions of SNMP, security features, filtering rules, prioritizations, etc. it was good to be refreshed. In the assignments where we had questions about different tools increased the awareness, got to learn many more new tools during this process.

Wiki and Portfolio was particularly useful, it gave me an opportunity to fulfill all my curiosity which was required for this course. I happen to read more about Kerberos, AES, Triples-DES, RADIUS, TACACS+, current hash algorithms like Blake,Gr0stl and JH. Exploring and understanding SHA-3 Zoo, wireless security, application security, firewalls, different security architecture, etc was fun. It made me up to date with current network security and with the help of Network security course I was able to understand what is going on!

Overall, I enjoyed every lecture video, transcripts, assignments, lab work, portfolio and wiki. It appears now I can enjoy and appreciate most of the security modules and applications which we come across during our everyday life. Of course curiosity never ends, with the help of what we have learned in this course we can keep expanding our knowledge at a faster rate.

 

Calendar
«  February 2025  »
SuMoTuWeThFrSa
      1
2345678
9101112131415
16171819202122
232425262728
Our poll
Rate my site
Total of answers: 3
Site friends
Statistics

Total online: 1
Guests: 1
Users: 0