HOME > IT & Software > Information Security and Cryptography

Information Security and Cryptography

SynopsisInformation Security and Cryptography, available at Free, has...
Information Security and Cryptography  No.1

Information Security and Cryptography, available at Free, has an average rating of 4.5, with 13 lectures, 5 quizzes, based on 7 reviews, and has 510 subscribers.

You will learn about Analyze the fundamentals of Information Security Understand the basics of Information Security Formulate the performance of Cryptographic Algorithms Grasp the knowledge of Security Concepts with various security techniques This course is ideal for individuals who are Beginners of Information Security and Cryptography It is particularly useful for Beginners of Information Security and Cryptography.

Enroll now: Information Security and Cryptography

Summary

Title: Information Security and Cryptography

Price: Free

Average Rating: 4.5

Number of Lectures: 13

Number of Quizzes: 5

Number of Published Lectures: 13

Number of Published Quizzes: 5

Number of Curriculum Items: 18

Number of Published Curriculum Objects: 18

Original Price: Free

Quality Status: approved

Status: Live

What You Will Learn

  • Analyze the fundamentals of Information Security
  • Understand the basics of Information Security
  • Formulate the performance of Cryptographic Algorithms
  • Grasp the knowledge of Security Concepts with various security techniques
  • Who Should Attend

  • Beginners of Information Security and Cryptography
  • Target Audiences

  • Beginners of Information Security and Cryptography
  • Cryptography and information security are vital areas for safeguarding digital communications and data. In this course you will get basic idea on ensuring the safety of information by reducing potential threats is known as information security. This is achieved by the three main concerns are data availability, integrity, and secrecy, which is often called the CIA triad. In this course initially you will understand the overview of information security polices. In that you will identify how the organizations need to implement security policies to improve security. Then you will understand how the threats and attacks vulnerability. In that you will understand the difference between threat and attack in more detail. Next you will understand regarding services and security mechanisms for messages in more detail.

    Then this course highlights the information integrity services in more detail. After understanding all the security concepts this course next you will get into cryptography concepts. In that you will understand to distinguish between cryptography and non cryptography attacks . Then you will understand the substitution techniques and transposition techniques in more detail. Then you will understand various substitution techniques such as Playfair cipher, poly alphabetic cipher etc. Then you will explore regarding double transposition techniques in detail. Further you will explore various security algorithms such as ECC, Diffie Hellman key exchange and PGP techniques.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Overview of Information Security Policies

    Lecture 2: Session2-Types of Threats and Security Attacks

    Lecture 3: Session3-Services and Security Mechanisms for Messages

    Lecture 4: Session4-Information Integrity Services

    Lecture 5: Session5-Cryptographic and Non Cryptographic Attack

    Lecture 6: Session 6-Cipher Technique: Substitution Technique

    Lecture 7: Session7-Cipher Techniques Playfair Cipher In Detail

    Lecture 8: Session8: Poly Alphabetic and Vignere Cipher

    Lecture 9: Session9- Double Transposition Technique

    Lecture 10: Session10-Diffie Hellman Key Exchange

    Lecture 11: Session11- Hill Cipher

    Lecture 12: Session 12-Eliptc Curve Cryptography

    Lecture 13: Session13- Pretty Good Privacy

    Instructors

  • Information Security and Cryptography  No.2
    DrUsha G
    Learn Easy and Enjoy your Learning
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 0 votes
  • 3 stars: 1 votes
  • 4 stars: 2 votes
  • 5 stars: 4 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!