- Overview of Information Security Policies
- Session2-Types of Threats and Security Attacks
- Session3-Services and Security Mechanisms for Messages
- Session4-Information Integrity Services
- Session5-Cryptographic and Non Cryptographic Attack
- Session 6-Cipher Technique: Substitution Technique
- Session7-Cipher Techniques Playfair Cipher In Detail
- Session8: Poly Alphabetic and Vignere Cipher
- Session9- Double Transposition Technique
- Session10-Diffie Hellman Key Exchange
- Session11- Hill Cipher
- Session 12-Eliptc Curve Cryptography
- Session13- Pretty Good Privacy
- Quiz
- Quiz
- Quiz
- Quiz
- Quiz
What you'll learn
- Analyze the fundamentals of Information Security
- Understand the basics of Information Security
- Formulate the performance of Cryptographic Algorithms
- Grasp the knowledge of Security Concepts with various security techniques
Description
Cryptography and information security are vital areas for safeguarding digital communications and data. In this course you will get basic idea on ensuring the safety of information by reducing potential threats is known as information security. This is achieved by the three main concerns are data availability, integrity, and secrecy, which is often called the CIA triad. In this course initially you will understand the overview of information security polices. In that you will identify how the organizations need to implement security policies to improve security. Then you will understand how the threats and attacks vulnerability. In that you will understand the difference between threat and attack in more detail. Next you will understand regarding services and security mechanisms for messages in more detail.
Then this course highlights the information integrity services in more detail. After understanding all the security concepts this course next you will get into cryptography concepts. In that you will understand to distinguish between cryptography and non cryptography attacks . Then you will understand the substitution techniques and transposition techniques in more detail. Then you will understand various substitution techniques such as Playfair cipher, poly alphabetic cipher etc. Then you will explore regarding double transposition techniques in detail. Further you will explore various security algorithms such as ECC, Diffie Hellman key exchange and PGP techniques.
Other Courses
Power Query - Advanced Microsoft Excel
Connect, collect and clean data without writing code.
Learn EVERYTHING About Gold IRAs & Precious Metal IRAs
Comprehensive Guide to Investing in Gold IRAs: Strategies, Benefits, and Best Practices for Financial Security
Japan In-Depth Learning 1: Japanese Basic Manners and Rules
Precise and Practical Program to Study Japanese Manners and Way of Thinking
About the instructors
- 4.22 Calificación
- 2143 Estudiantes
- 6 Cursos
DrUsha G
Learn Easy and Enjoy your Learning
I am working as a Associate Professor in SRM IST KTR, TamilNadu, India. My passion is to teach, learn and update with current technologies. My research areas are Wireless Security, Machine Learning, Deep Learning, Quantum Computing etc.I am a GATE scorer in UG, I had published more than 70 articles in reputed journals.
Student feedback
Course Rating
Reviews
very Good ..Easy understanding of basic for beginners.