Security Lab Manual
User Manual:
Open the PDF directly: View PDF
Page Count: 52
- DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
- INDEX
- Department of Computer Science and Engineering
- 1. Be exposed to the different cipher techniques.
- 2. Learn to implement the algorithms DES, RSA, MD5, SHA-1.
- 3. Have hands on experience to perform wireless security audit on access points.
- a. Students are able to solve different cipher techniques.
- b. Students are able to implement cryptographic algorithms.
- c. Students are able to perform wireless security audit of access points.
- d. Students are able to use various network security tools.
- e. Students are able to configure firewalls.
- LIST OF EXPERIMENTS