Ethical Hacking; Information Security

Other
Alison

Course details

Course description

This free online information security course can be of great help in those moments when you want to secure your system or network by ensuring that attackers do not have access to some information. The course gives you some great insights into the concept of cryptography, cryptographic hash functions, stenography and biometrics. By the end of the course, you will be much better equipped to deal with issues related to information security.

This course will begin by introducing you to the concept of Cryptography. You will learn about private-key cryptography, public-key cryptography and the principles behind how they work. You will learn about generic security attacks, security services and cryptographic primitives which are used for the provision of such security services. You will also learn about private key cryptography techniques and be introduced to some cryptography algorithms and classical encryption techniques broadly categorized into substitution and transposition ciphers. You will then get to learn about Diffie-Hellman key exchange and message authentication as it relates to cryptography.

The course then explains cryptographic hash functions. You will learn about the basic properties of hash functions, requirements of hash functions and popular hash functions. Furthermore, you will learn the importance of digital signatures, digital certificates, secure socket layer and some common security protocols. You will learn about the types of one-way hash functions and understand the several ways one-way hash functions can be used before you move on to learn specifically about two different hash functions; the SHA-512 and HMAC. You will also learn about the Transport Layer Security(TLS), IP security(IPsec) and Secure HTTP(S-HTTP).

Finally, you will learn the importance of information security, including email security and DNS. You will learn about biometrics and steganography. You will learn about the history of steganography, steganography in image files, methods of steganography, and examples of steganographic images. As for biometrics, you will get educated on the various biometric traits used in practice like fingerprints, iris scan, hand geometry and major applications of biometrics for authentication. Start this free course today and build your knowledge base.

Provided by

Entry requirements

Please contact the course provider for details.

Course options

Course details

Online

Check with the course provider for dates.

Cost: £0.00 (ex. VAT)

Venue details

This is the main contact address for the provider. This may not be the location where this course is presented.