E-Learning (IT) - Ethical Hacking; Information Security
- Admin
- Nov 3, 2024
- 1 min read

Introduction
This free online information security course can be of great help in those moments when you want to secure your system or network by ensuring that attackers do not have access to some information. The course gives you some great insights into the concept of cryptography, cryptographic hash functions, stenography and biometrics. By the end of the course, you will be much better equipped to deal with issues related to information security.
Learning Objectives
Describe the four types of security attacks
Explain the active and passive classification of security attacks
Outline five categories of desirable security services
Discuss the Network Access Security Model
Explain the working mechanism of private and public-key cryptography
Define Cryptographic Hash Functions
Outline the types of Cryptographic Hash Functions
Explain the desirable properties of hash functions
Summarize the meaning and history of steganography
Explain the meaning of steganography and digital watermarking
Describe the examples of steganography in image files
Duration
1.5 to 3.0 hours of learning
Fees
Free course for learning
Course Start Date & Time
Learn anytime & anywhere
コメント