What you'll get

  • Job Credibility
  • Certification Valid for Life
  • Live Classes
  • Certificate of Completion

Exam details

  • Mode of Exam : Online
  • Duration : 1 Hour
  • Multiple Choice Questions are asked
  • No. of Questions are asked : 50
  • Passing Marks : 25 (50%)
  • There is no negative marking

Information security is a completely independent and vital term for every business. The need for information security experts is increasing due to the enhancement of Information technology. The course Diploma in Information Security is designed for students who are willing to pursue an online information security course. This course is also recommended for those pursuers who want to learn about information security, computer security, and ethical hacking.

In this course, students will be learning about all the vital terminologies that are essential for a diploma student. the student will explore concepts of information security from the base level and will reach up to the advanced with modern modules. 

Students will learn about the simple module of the IT industry and will gain essential skills. In short, you will learn about cryptography, computer, and network security aspects and solutions, and understand how to be a security management expert. You will also learn about the basics of ethical hacking, cybersecurity, using kali Linux, understanding malware, and many other key terms will be taught. Also, setting up penetration testing lab, gathering information, web application, and social engineering.

At the end of the course, you will be able to detect and prevent malware and also able to secure yourself from cyber attacks. You will learn each term practically and our experts will guide you.

The courses are best suited for those who are ready to take their first step into information security and the candidate who wants to be ethical hackers in the future. There are a lot of future possibilities if you know this skill as the technology will grow up and the company will have these professionals to prevent cyber attacks for reducing the company loss.

Course Content

Total: 86 lectures
  • Ciphertext-Only Attack (COA)
  • Terminology in Cryptography
  • Concept of security aspects
  • Security Attacks
  • Security Service
  • Security Mechanisms
  • Attack Types
  • Classical Cryptography
  • Simple Substitution Cipher
  • Tranposition Cipher
  • The Shift Cipher(Caesar Cipher)
  • The Vigenere Cipher
  • Affine Cipher
  • Basic Cryptanalysis
  • Known-Plaintext Attack (KPA)
  • Chosen-Plaintext Attack (CPA)
  • Chosen-Ciphertext Attack (CCA)
  • Side Channel Attack
  • Man-In-The-Middle Attack
  • Timing Differential Power Analysis
  • Groups, Rings and Fields
  • Integer Arithmetic
  • Modular Arithmetic Part 1
  • Modular Arithmetic Part 2
  • The Euclidean Algorithm
  • Finite Fields of the Form GF (p)
  • Polynomial Arithmetic
  • Finite Fields of the Form GF (2n)
  • Linear Congruence
  • Prime Numbers
  • Primality Testing
  • Factorization
  • Fermat's and Euler;s Theorem
  • Testing for Primality
  • The Chinese Remainder Theorem (CRT)
  • Discreate Logaruthms
  • Data Encryption Standard (DES)
  • DES Encryption
  • DES Decryption
  • Multiple Encryptions
  • Double Data Encryption Standrad (Double-DES)
  • Triple-Data Encryption Standard (Triple-DES)
  • Trpes of Attacks on Encrypted Messages
  • Attacks on DES
  • Advanced Encryption Standard (AES)
  • AES Cipher
  • AEs Encryption and Decryption
  • RC4 Stream Cipner
  • Perfect Security
  • Cipher Machines (Rotor Machines)
  • Electronic CodeBook (ECB) Mode
  • Cipher Block Changing (CBC) Mode
  • Cipher FeedBack (CFB) Mode
  • Output FeedBack (OFB) Mode
  • Counter (CTR) Mode
  • Comparison of Modes
  • Introduction to Pseudorandom Numbers
  • Theory of Pseudorandom Numbers
  • Pseudorandom Number Generators
  • Classes of Attacks on Pseudo Random Number Generators (PRNGs)
  • Tests for pseudorandom functions
  • Truly random Numbers
  • Next-bit Test
  • Removing Biases
  • ANSI X917 Generator
  • Blum-Blum-Shub Generator
  • Statistical Tests
  • Hash Function
  • Cryptographic Hash Function
  • Example of Cryptographic Hash Function
  • Birthday Attack
  • Collision Resistant Attack
  • Multicollision Attack
  • MD5 (Message Digest Algorithm)
  • MD5 Compression Function
  • Secure Hash Algorithm (SHA)
  • SHA-1 Compression Function
  • SHA-256
  • SHA-384
  • SHA-512
  • Message Authentication Codes(MAC)
  • Requirements for MACs
  • Difference between Hash and MAC
  • Authenticated Encryption
  • Counter with Cipher Block Chaining-Message Authentication Code
  • Galois Counter Mode

Reviews

Please login or register to review