Information Security for Project Managers: Encryption and Hashing
Learn about the techniques of encryption, hashing, and guidelines for Information security in this free online course.Publisher: Frank Hissen
CertificazioneView course modules
Do you experience difficulties using encryption terminologies or do you wish to stand out in the techniques of hashing? Then this course is for you! Information Security for Projects Managers: Encryption and Hashing is a free online course from Alison that introduces the basic concepts of information security to project and general managers. In this course, the reasons for the encryption of data and instances of why data should be encrypted will be discussed in practical terms. Learn about the definition of encryption and other associated technical terms. You will be taught symmetric and asymmetric encryption together with public key exchange. Learn about the application and algorithm of hybrid encryption in addition to password-based encryption. Study the commonly used algorithms and the technical parameters for encryption. The basic types of cryptographic keys will also be covered in this course. Learn about the technicalities in converting plaintext to encryption text in a demo. Study the various formats, purposes, practices, and target groups of file encryption.
Moreover, this course outlines the characteristics of ZIP encryption and OpenPGP as well as a brief summary of encryption principles. You will learn about the basic environmental setup and the characteristics of different Java versions related to crypto algorithms. Java cryptography architecture and the basic hashing class with practical examples will be explained in detail as well. You will study the application and best practices for hashing documents using real-world scenarios on the Java platform. Explore the practical application, importance and uniqueness of the efficient stream-based hashing technique hashing. By taking this course, you will gain a sufficient understanding of the creation and proper application of the message authentication code. Learn how to implement and integrate a secure password hashing scheme into your application in this course. Gain practical knowledge of the application of wrapper libraries and how to install the Java cryptography extension unlimited strength jurisdiction policy files. Also, critical factors in handling IT security by general and project managers will be covered in this course.
Are you trying to figure out how to handle holes in IT security projects? This course discusses why IT security should be enforced in such projects. Moreso, topics such as Information security protection, process and standards will be analyzed extensively. You will learn about the protection goals of IT security and the reasons why IT security fails. You will study the information management process and the information security standards project managers ought to deal with. Learn the requirements derived from laws and data regulations that are needed to be carried out within an IT project. Finally, the guides implemented to checkmate the overlooked areas of IT security within a project will be also covered in this course. This course will be of great benefit to project managers, general managers, students, researchers, information security enthusiasts, and all who have an interest in information security. Register for this course today and take your information security skills to the next level!Inizio Corso Ora
Encryption Terminologies and Techniques
Encryption Terminologies and Techniques - Learning Outcomes
Introduction to Encryption
Common Encryption Technologies
Technical Aspects of Encryption
File and System Encryption
Encryption Terminologies and Techniques - Lesson Summary
Encryption Terminologies and Techniques - Assessment
Password Hashing - Learning Outcomes
Introduction to Hashing
Hashing and Message Digest
JCE File Installation
Password Hashing - Lesson Summary
Password Hashing - Assessment
Information Security for Projects
Information Security for Projects - Learning Outcomes
Introduction to IT Security
IT Protection, Process and Standards
Data Protection Laws and Checklist
Information Security for Projects - Lesson Summary
Information Security for Projects - Assessment
Upon successful completion of this course, you will be able to:
- Explain the reasons for the encryption of data.
- Define encryption and other associated technical terms.
- Discuss the types of encryption.
- Discuss the various formats, purposes, practices, and target groups of file encryption.
- Explain Java cryptography architecture and the basic hashing class.
- Analyze the creation and application of the message authentication code.
- Discuss how to implement and integrate a secure password hashing scheme into your application.
- Outline the application of wrapper libraries and how to install the JCE files.
- Discuss the holes in IT security projects.
- Discuss the information management process and the information security standards.
- Analyze the requirements derived from laws and data regulations.
All Alison courses are free to study. To successfully complete a course you must score 80% or higher in each course assessments. Upon successful completion of a course, you can choose to make your achievement formal by purchasing an official Alison Diploma, Certificate or PDF.
Having an official Alison document is a great way to celebrate and share your success. It is:
- Ideal to include with CVs, job applications and portfolios
- A way to show your ability to learn and achieve high results