Ethical Hacking; Information Security

$0.00

Looking for the best deal on this product?

This item is available from Alison US CA. Click below to check the latest price, availability, and any current offers.

👉 Check Latest Price
We may earn a commission if you purchase through this link at no extra cost to you.

Why people buy this

  • Popular choice in its category
  • Competitive pricing from trusted retailer
  • Fast online availability

Product details

This course will begin by introducing you to the concept of Cryptography. You will learn about private-key cryptography public-key cryptography and the principles behind how they work. You will learn about generic security attacks security services and cryptographic primitives which are used for the provision of such security services. You will also learn about private key cryptography techniques and be introduced to some cryptography algorithms and  classical encryption techniques broadly categorized into substitution and transposition ciphers. You will then get to learn about Diffie-Hellman key exchange and message authentication as it relates to cryptography.The course then explains cryptographic hash functions. You will learn about the basic properties of hash functions requirements of hash functions and popular hash functions. Furthermore you will learn the importance of digital signatures digital certificates secure socket layer and some common security protocols.  You will learn about the types of one-way hash functions and understand the several ways  one-way hash functions can be used before you move on to learn specifically about two different hash functions; the SHA-512 and HMAC. You will also learn about the Transport Layer Security(TLS) IP security(IPsec) and Secure HTTP(S-HTTP). Finally you will learn the importance of information security including email security and DNS. You will learn about biometrics and steganography. You will learn about the history of steganography steganography in image files methods of steganography and examples of steganographic images. As for biometrics you will get educated on the various biometric traits used in practice like fingerprints iris scan hand geometry and major applications of biometrics for authentication. Start this free course today and build your knowledge base.