Introduction to Information Security

Free Information Security Course with Certificate

4.4
learner icon
166.3K+ Learners
beginner
Beginner

Enrol for this comprehensive and hands-on free online training to master information security fundamentals. Led by our experts, this course covers various topics, including different breach types, in-depth hashing and more!

What you learn in Introduction to Information Security ?

tick
Information Security
tick
Hash
tick
Cryptography
tick
Breach and it's type

About this Course

In this course, we will explore the world of information security and equip you with the essential knowledge to protect digital assets. We'll dive deep into real-world breaches, studying their implications and understanding how attackers operate. From the notorious Yahoo, OPM, Anthem, and JP Morgan Chase, to the infamous Target breach, we'll analyze the attacker lifecycle and the key attack vectors employed. You'll learn about effective defense strategies through a holistic defense-in-depth approach. We'll cover the Security Score Card, password breaches, and how to store and hash passwords securely. Ever wondered why custom hardware is faster? We'll uncover its reasons and explore better hashing approaches like Ballon Hashing.

 

We'll also delve into advanced topics such as Control Flow Integrity and Cryptographic Control Flow Integrity, providing insights into protecting software from malicious manipulation. Throughout the course, we encourage your participation in Q&A sessions to address any doubts. We'll also discuss the wide-ranging applications of computer security and explore its exciting future.

 

After this free, self-paced, beginner-level guide to Information Security, you can enroll in the Cyber Security courses and embark on your career with the professional Post Graduate certificate and learn various concepts in depth with millions of aspirants across the globe!

Course Outline

Attacker Lifecycle

This section shall briefly discuss a hacker's life cycle and its different stages and then explain the traditional approach they use in this section. 

Yahoo Breach

This section discusses a Yahoo breach case study and encloses the figures on what got stolen, its impact, approach, and the root cause for the breach.

OPM Breach

This section discusses the Office of Personnel Management breach case study and encloses figures and statistics on what got stolen, its impact, approach, the root cause, and the way through which the breach could have been prevented. 

Anthem Breach

This section discusses the Anthem breach case study and encloses figures and statistics on what got stolen, its impact, approach, the root cause, key vulnerabilities, and the way through which the breach could have been prevented.

JP Morgan Chase Breach

This section discusses the JP Morgan Chase breach case study, and encloses figures and statistics on what got stolen, its impact, approach, the root cause, key vulnerabilities, and the way through which the breach could have been prevented.

Target Breach

This section discusses the Target breach case study, and encloses figures and statistics on what got stolen, its impact, approach, the root cause, and the way through which the breach could have been prevented.

Key Attack Vectors & Defenses

 This section points to the attack vectors such as phishing, malware, and cookie generation and addresses the corresponding defenses. 

Holistic Defense-In-Depth Approach

In this section, you will understand the importance of preventing the breach from happening and also learn the follow-up process in case it does.

Security Score Card

Security Score Card is an information security company that evaluates and rates the Cyber Security postures of third-party companies.

Password Breaches

This section explains password breaches and points to LinkedIn, Twitter, Evernote, Adobe, and PwdMgr examples for your understanding. 

How to Store Passwords

This section gives you tips on where and how to store your data and enlightens you on what not to do while storing passwords.

How to Hash?

This section demonstrates a popular case study on how LinkedIn password management failed and explains the hash function to counter the attack.

Why is Custom Hardware Faster?

This section briefs the architecture of a part of the CPU used to hash and explains the technique that can be used to strengthen processing speed.

Better Hashing Approach

One of the better hashing approaches is the Scrypt hash function.

Ballon Hashing

This section begins with explaining the properties of hashing and then continues with a briefing on Ballon hashing along with the code demonstration.

Control Flow Integrity

This section defines control flow integrity, explains its purpose, and demonstrates a code to help you understand working to protect indirect calls with CFG. 

Cryptographic Control Flow Integrity

This section explains a threat model and an approach called Cryptographic Control-Flow Integrity to control integrity.

Q/A

The speaker answers various questions in this module to make it interesting.

Computer Security - Its applications and its future

You will learn various applications of computer security along with its future scope.

What our learners say about the course

Find out how our platform helped our learners to upskill in their career.

4.4
Course Rating
66%
22%
7%
2%
3%

Introduction to Information Security

With this course, you get

clock icon

Multi device access

Learn anytime, anywhere

medal icon

Completion Certificate

Stand out to your professional network

medal icon

1.5 Hours

of self-paced video lectures

share icon

Share with friends