Ethical Hacking; Information Security
Learn about information security, cryptography, and cryptographic hash functions in this free online course.
Take this certificate on your own.
Start now and learn at your own pace.
CertificationView course modules
This course will begin by introducing you to the concept of Cryptography. You will learn about private-key cryptography, public-key cryptography and the principles behind how they work. You will learn about generic security attacks, security services and cryptographic primitives which are used for the provision of such security services. You will also learn about private key cryptography techniques and be introduced to some cryptography algorithms and classical encryption techniques broadly categorized into substitution and transposition ciphers. You will then get to learn about Diffie-Hellman key exchange and message authentication as it relates to cryptography.
The course then explains cryptographic hash functions. You will learn about the basic properties of hash functions, requirements of hash functions and popular hash functions. Furthermore, you will learn the importance of digital signatures, digital certificates, secure socket layer and some common security protocols. You will learn about the types of one-way hash functions and understand the several ways one-way hash functions can be used before you move on to learn specifically about two different hash functions; the SHA-512 and HMAC. You will also learn about the Transport Layer Security(TLS), IP security(IPsec) and Secure HTTP(S-HTTP).
Finally, you will learn the importance of information security, including email security and DNS. You will learn about biometrics and stenography. You will learn about the history of stenography, stenography in image files, methods of stenography, and examples of stenographic images. As for biometrics, you will get educated on the various biometric traits used in practice like fingerprints, iris scan, hand geometry and major applications of biometrics for authentication. Start this free course today and build your knowledge base.Start Course Now
Cryptography - Learning Outcomes
Basic Concepts of Cryptography
Diffie-Hellman Key Exchange and Authentication
Cryptography - Lesson Summary
Cryptographic Hash Functions
Cryptographic Hash Functions - Learning Outcomes
Cryptographic Hash Functions
One-Way Hash Functions
Digital Signature and Certificate
Secure Socket Layer (SSL) and How it Works
Transport Layer Security and IPSec
Cryptographic Hash Functions - Lesson Summary
Information Security - Learning Outcomes
Information Security - Lesson Summary
Upon the successful completion of this course, you will be able to:
- Describe the four types of security attacks
- Explain the active and passive classification of security attacks
- Outline five categories of desirable security services
- Discuss the Network Access Security Model
- Explain the working mechanism of private and public-key cryptography
- Define Cryptographic Hash Functions
- Outline the types of Cryptographic Hash Functions
- Explain the desirable properties of hash functions
- Summarize the meaning and history of stenography
- Explain the meaning of stenography and digital watermarking
- Describe the examples of stenography in images files
All Alison courses are free to enrol, study and complete. To successfully complete this Certificate course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this Certificate course, you have the option to acquire an official Certificate, which is a great way to share your achievement with the world. Your Alison Certificate is:
Ideal for sharing with potential employers - include it in your CV, professional social media profiles and job applications
An indication of your commitment to continuously learn, upskill and achieve high results
An incentive for you to continue empowering yourself through lifelong learning
Alison offers 3 types of Certificates for completed Certificate courses:
Digital Certificate - a downloadable Certificate in PDF format, immediately available to you when you complete your purchase
Certificate - a physical version of your officially branded and security-marked Certificate, posted to you with FREE shipping
Framed Certificate - a physical version of your officially branded and security-marked Certificate in a stylish frame, posted to you with FREE shipping
All Certificates are available to purchase through the Alison Shop. For more information on purchasing Alison Certificates, please visit our FAQs. If you decide not to purchase your Alison Certificate, you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Dashboard. For more details on our Certificate pricing, please visit our Pricing Page.