Science & Technology Course

Preparing for Cybersecurity

Course Type: Certification | Study Mode: Part-Time
Keywords: Diploma | Undergraduate | Cybersecurity

Course Detail

Introduction
Today over 10 billon smart devices are interconnected in cyberspace which has changed our way of lives and we have become more dependent on it. However, this dependency also makes us vulnerable, therefore, we need to make sure that the cyberspace is protected from cyber attackers as they can target individuals, companies and governments, and can cause hundreds of billions of dollars in losses every year. Therefore, there is a high demand worldwide for information security professionals to provide protection to individuals and organizations against growing threats from cyber attackers.
This subject intends to provide students with essential concepts of information security, cryptography, secure protocols, detection and other security techniques.
Curriculum Overview

Course Outline

Introduction

Information security concepts, threats and services. Security planning, technical and nontechnical aspects, policy based security, security approaches, security models, security strategies and security professionals.

Secret / Public-Key Cryptosystems

Classical ciphers. Data Encryption Standard (DES). Advanced Encryption Standard (AES). Modes of operation. Concepts of public-key cryptosystems. RSA. Secure Hash Standard (SHS). Digital Signature Standard (DSS).

Secure Protocols

Authentication protocols. Key exchange protocols. Identification protocols. Secret sharing. Secure Electronic Transaction (SET). Secure Socket Layer (SSL).

Electronic Election and Digital Money

Electronic election protocols. Untraceable digital coins. Divisible electronic cash. Electronic cash protocols. Micropayment systems.

Intrusion Detection, Social Networks and Cyber Security

Generic intrusion detection model. Host intrusion detection systems. Network intrusion detection systems. Database security. Information security awareness, education, social engineering, cyber bullying, social media and its impacts on the society, mobile security and cloud computing.

Entry Requirements

Anyone who is connected to internet and wants to upgrade his/her skills in information security area. This course will be beneficial for professionals making information security decisions in businesses and government departments, or individuals who need the expertise to make the right decisions to protect their organizations from cyber threats. No pre-requisite is needed for this course.

Other Information

Funding

- SkillsFuture Series / SSG

- SkillsFuture Credit

Please click on "Request Info" to understand more.