YoVDO

Introduction to Security and Network Forensics: Authentication - Lecture 4

Offered By: Bill Buchanan OBE via YouTube

Tags

Cybersecurity Courses Cryptography Courses Network Security Courses Identity Management Courses Digital Certificates Courses Biometrics Courses

Course Description

Overview

Learn about authentication methods in security and network forensics through this comprehensive video lecture. Explore key principles of security, authentication techniques including biometrics, message hashing, and digital certificates. Understand concepts like trusted roots, Microsoft CardSpace, and personal cards. Examine the roles of relying parties and identity providers in authentication systems. Delve into practical applications such as email encryption and authentication with PGP. Part of a broader series on security and forensic computing, this lecture provides essential knowledge for students and professionals in the field.

Syllabus

Intro
Principles of Security
Key Issues
Authentication Methods
Biometrics
Message Hash
Digital Certificate
Trusted Root
Microsoft Card Space
Personal Card
Relying Party
Identity Provider
Analogy
Example
Email Encryption
Authentication with PGP


Taught by

Bill Buchanan OBE

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity