Course Outline
Introduction
Information security concepts, threats and services. Security planning, technical and nontechnical aspects, policy based security, security approaches, security models, security strategies and security professionals.
Secret / Public-Key Cryptosystems
Classical ciphers. Data Encryption Standard (DES). Advanced Encryption Standard (AES). Modes of operation. Concepts of public-key cryptosystems. RSA. Secure Hash Standard (SHS). Digital Signature Standard (DSS).
Secure Protocols
Authentication protocols. Key exchange protocols. Identification protocols. Secret sharing. Secure Electronic Transaction (SET). Secure Socket Layer (SSL).
Electronic Election and Digital Money
Electronic election protocols. Untraceable digital coins. Divisible electronic cash. Electronic cash protocols. Micropayment systems.
Intrusion Detection, Social Networks and Cyber Security
Generic intrusion detection model. Host intrusion detection systems. Network intrusion detection systems. Database security. Information security awareness, education, social engineering, cyber bullying, social media and its impacts on the society, mobile security and cloud computing.
Anyone who is connected to internet and wants to upgrade his/her skills in information security area. This course will be beneficial for professionals making information security decisions in businesses and government departments, or individuals who need the expertise to make the right decisions to protect their organizations from cyber threats. No pre-requisite is needed for this course.
Funding
- SkillsFuture Series / SSG
- SkillsFuture Credit
Please click on "Request Info" to understand more.
You will be redirecting to Course Provider Payment Gateway.