Alison's New App is now available on iOS and Android! Download Now

Ethical Hacking; Information Security

Learn about information security, cryptography, and cryptographic hash functions in this free online course.

Publisher: NPTEL
This free online information security course can be of great help in those moments when you want to secure your system or network by ensuring that attackers do not have access to some information. The course gives you some great insights into the concept of cryptography, cryptographic hash functions, stenography and biometrics. By the end of the course, you will be much better equipped to deal with issues related to information security.
Ethical Hacking; Information Security
  • Duration

    1.5-3 Hours
  • Students

  • Accreditation


Share This Course And
Earn Money  

Become an Affiliate Member





View course modules


This course will begin by introducing you to the concept of Cryptography. You will learn about private-key cryptography, public-key cryptography and the principles behind how they work. You will learn about generic security attacks, security services and cryptographic primitives which are used for the provision of such security services. You will also learn about private key cryptography techniques and be introduced to some cryptography algorithms and  classical encryption techniques broadly categorized into substitution and transposition ciphers. You will then get to learn about Diffie-Hellman key exchange and message authentication as it relates to cryptography.

The course then explains cryptographic hash functions. You will learn about the basic properties of hash functions, requirements of hash functions and popular hash functions. Furthermore, you will learn the importance of digital signatures, digital certificates, secure socket layer and some common security protocols.  You will learn about the types of one-way hash functions and understand the several ways  one-way hash functions can be used before you move on to learn specifically about two different hash functions; the SHA-512 and HMAC. You will also learn about the Transport Layer Security(TLS), IP security(IPsec) and Secure HTTP(S-HTTP). 

Finally, you will learn the importance of information security, including email security and DNS. You will learn about biometrics and steganography. You will learn about the history of steganography, steganography in image files, methods of steganography, and examples of steganographic images. As for biometrics, you will get educated on the various biometric traits used in practice like fingerprints, iris scan, hand geometry and major applications of biometrics for authentication. Start this free course today and build your knowledge base.

Start Course Now