Sharing Is Caring:

Introduction to Information Security

  • Information Security and Cryptography
  • Free tutorial
  • Rating: 4.4 out of 54.4 (118 ratings)
  • 3,361 students
  • 1hr 28min of on-demand video
  • Created by Mariyam Ejaz Maniyar

English

What you’ll learn

  • Information Security
  • Cryptography
  • Cryptographic Algorithms

Requirements

  • Fundamental of Computer Network

Description

Information Security is not only about securing information from unauthorized access. Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

Information can be physical or electronic one. Information can be anything like Your details or we can say your profile on social media, your data in mobile phone, your bio-metrics etc. Thus Information Security spans so many research areas like Cryptography, Mobile Computing, Cyber Forensics, Online Social Media etc.

Information Security programs are build around 3 objectives, commonly known as CIA – Confidentiality, Integrity, Availability.

Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix “crypt-” means “hidden” or “vault” — and the suffix “-graphy” stands for “writing.” This short course will run you through few of most important cryptographic protocols.

  1. Confidentiality – means information is not disclosed to unauthorized individuals, entities and process. For example if we say I have a password for my Gmail account but someone saw while I was doing a login into Gmail account. In that case my password has been compromised and Confidentiality has been breached.
  2. Integrity – means maintaining accuracy and completeness of data. This means data cannot be edited in an unauthorized way. For example if an employee leaves an organisation then in that case data for that employee in all departments like accounts, should be updated to reflect status to JOB LEFT so that data is complete and accurate and in addition to this only authorized person should be allowed to edit employee data.
  3. Availability – means information must be available when needed. For example if one needs to access information of a particular employee to check whether employee has outstanded the number of leaves, in that case it requires collaboration from different organizational teams like network operations, development operations, incident response and policy/change management.
    Denial of service attack is one of the factor that can hamper the availability of information.
Read Also -->   Build and Deploy Your First Decentralized App with Etherem

Who this course is for:

  • Algorithm enthusiast
  • Ethical hackers
  • Security analysts

Show less

Course content

8 sections β€’ 9 lectures β€’ 1h 27m total lengthCollapse all sections

Introduction1 lecture β€’ 3min

  • Introduction to the Course02:51

Introduction to Information Security1 lecture β€’ 14min

  • Information Security13:45
  • Quiz on Information Security5 questions

Types of attack1 lecture β€’ 7min

  • Types of attack07:23

Security policies1 lecture β€’ 12min

  • Security policies12:21

Cryptography and components of Cryptosystem1 lecture β€’ 12min

  • Cryptography and components of Cryptosystem11:48
  • Quiz7 questions

Types of Cipher2 lectures β€’ 17min

  • Types of Ciphers Part 106:51
  • Types of Ciphers Part 210:22
  • Quiz4 questions

Symmetric Cryptography – DES Algorithm1 lecture β€’ 9min

  • Symmetric Cryptography – DES (Data Encryption Standard) Algorithm08:40
  • Quiz3 questions

Asymmetric Cryptography Algorithm – RSA Algorithm1 lecture β€’ 14min

  • Asymmetric Cryptography Algorithm – RSA (Rivest–Shamir–Adleman) Algorithm13:30
  • Quiz7 questions

πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡ Click Below to Enroll in Free Udemy Course πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡

Go to Course

πŸ‘‡πŸ‘‡ See Also πŸ‘‡πŸ‘‡

Join Us Join Us Join Us
Sharing Is Caring:

Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock