-
iop-115.010 | Preparing Our Server | Lessons
1-
Lecture1.1
-
-
STEP-100
14-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
Lecture2.5
-
Lecture2.6
-
Lecture2.7
-
Lecture2.8
-
Lecture2.9
-
Lecture2.10
-
Lecture2.11
-
Lecture2.12
-
Lecture2.13
-
Lecture2.14
-
-
STEP-101
8-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
Lecture3.4
-
Lecture3.5
-
Lecture3.6
-
Lecture3.7
-
Lecture3.8
-
-
STEP-102
9-
Lecture4.1
-
Lecture4.2
-
Lecture4.3
-
Lecture4.4
-
Lecture4.5
-
Lecture4.6
-
Lecture4.7
-
Lecture4.8
-
Lecture4.9
-
-
STEP-103
7-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
Lecture5.5
-
Lecture5.6
-
Lecture5.7
-
-
STEP-104
7-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
Lecture6.5
-
Lecture6.6
-
Lecture6.7
-
-
STEP-105
5-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
Lecture7.4
-
Lecture7.5
-
-
Challange
1-
Lecture8.1
-
-
STEP-106
4-
Lecture9.1
-
Lecture9.2
-
Lecture9.3
-
Lecture9.4
-
-
STEP-107 NOT READY
5-
Lecture10.1
-
Lecture10.2
-
Lecture10.3
-
Lecture10.4
-
Lecture10.5
-
-
STEP-108 NOT READY
4-
Lecture11.1
-
Lecture11.2
-
Lecture11.3
-
Lecture11.4
-
-
STEP-109 NOT READY
4-
Lecture12.1
-
Lecture12.2
-
Lecture12.3
-
Lecture12.4
-
-
STEP-110 NOT READY
4-
Lecture13.1
-
Lecture13.2
-
Lecture13.3
-
Lecture13.4
-
WAS.001.002 | Web-based Security Protocols | Lesson
Web-based security protocols are used to provide secure transactions between Internet users and web sites. These protocols provide confidentiality through encryption and authentication through the use of digital signatures. From transferring date to making phone calls or sending video calls over a network, communication needs to be secure.
Network security protocols are a type of network protocol that ensures the security and integrity of data in transit over a network connection. Network security protocols define the processes and methodology to secure network data from any illegitimate attempt to review or extract the contents of data.
Network security protocols are primarily designed to prevent any unauthorized user, application, service or device from accessing network data. This applies to virtually all data types regardless of the network medium used.
Network security protocols generally implement cryptography and encryption techniques to secure the data so that it can only be decrypted with a special algorithm, logical key, mathematical formula and/or a combination of all of them. Some of the popular network security protocols include Secure File Transfer Protocol (SFTP), Secure HypertextHypertext is text displayed on a computer display or other electronic devices with references (hyperlinks) to other text that the reader can immediately access, or where text can be revealed progressively at multiple levels of detail (also called StretchText). Hypertext documents are interconnected ... Transfer Protocol (HTTPS) and Secure Socket Layer (SSL).