Great Learning
Great Learning Logo

Introduction to Information Security 

  • Offered byGreat Learning

Introduction to Information Security
 at 
Great Learning 
Overview

Duration

1 hour

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Introduction to Information Security
 at 
Great Learning 
Highlights

  • Earn a certificate of completion
Details Icon

Introduction to Information Security
 at 
Great Learning 
Course details

What are the course deliverables?
  • Information Security
  • Hash
  • Cryptography
  • Breach and it's type
More about this course
  • This Introduction to Information Security course is designed to give you insights on various aspects of securing your data
  • The course begins with briefing the attacker's lifecycle and continues with explaining different case studies on popular companies, attack type, cause, and the ways they could have been prevented
  • The course then explains breaches such as target breaches and password breaches
  • It takes you through crucial attack vectors, defenses like holistic defense, security scorecards, do's and don'ts to save passwords, hash and its methods, custom hardware, control-flow integrity, and cryptographic approach for control flow integrity concepts

Introduction to Information Security
 at 
Great Learning 
Curriculum

Attacker Lifecycle

Yahoo Breach

OPM Breach

Anthem Breach

JP Morgan Chase Breach

Target Breach

Key Attack Vectors & Defenses

Holistic Defense-In-Depth Approach

Security Score Card

Password Breaches

How to Store Passwords

How to Hash?

Why is Custom Hardware Faster?

Better Hashing Approach

Ballon Hashing

Control Flow Integrity

Cryptographic Control Flow Integrity

Q/A

Computer Security - Its applications and its future

Introduction to Information Security
 at 
Great Learning 
Admission Process

    Important Dates

    Nov 30, 2024
    Course Commencement Date

    Other courses offered by Great Learning

    3.5 L
    5 months
    – / –
    97 K
    4 months
    – / –
    2.75 L
    12 months
    – / –
    2.75 L
    12 months
    – / –
    View Other 1225 CoursesRight Arrow Icon

    Introduction to Information Security
     at 
    Great Learning 
    Students Ratings & Reviews

    4.7/5
    Verified Icon6 Ratings
    G
    Geethika Gondi
    Introduction to Information Security
    Offered by Great Learning
    5
    Learning Experience: Course content is sufficient for beginners, platform was online and recorded vedios, if u listen carefully it will helpfull. After completion of course they will provide a quiz and certification.
    Faculty: Their is no faculty for great learning app. Those are all recorded vedios Their course curriculum is very clear. I like it very much. They provide examples with pictures
    Course Support: Knowledge about the topics
    Reviewed on 28 Jan 2023Read More
    Thumbs Up IconThumbs Down Icon
    P
    Prabhjotsingh Chalhotra
    Introduction to Information Security
    Offered by Great Learning
    4
    Learning Experience: Compete framework covers not only a comprehensive training program to prepare you for the certification exam, but also the industry's most robust, in-depth, hands-on lab experience of any cybersecurity program available. C|EH v12 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organizations.
    Faculty: A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata). To become a CEH and attain this certification, you need to master certain skills and concepts such as penetration testing, foot printing and reconnaissance, and social engineering. In Official CEH Training, the course covers backdoors, viruses, Trojan horses, and worms. Also, it includes modules on “ SQL injections, Session hijacking, Denial of Service (DoS) attacks, and system hacking. You may also want to learn how to scan and sniff networks, crack the wireless encryption, and evade IDS and honeypots and firewalls.
    Reviewed on 6 Nov 2022Read More
    Thumbs Up IconThumbs Down Icon
    S
    Sameera D
    Introduction to Information Security
    Offered by Great Learning
    5
    Learning Experience: Very good platform for learners
    Faculty: Quality of lectures are also very good They make concepts very clear in simple and understandable language
    Course Support: No career support provided
    Reviewed on 1 Jul 2022Read More
    Thumbs Up IconThumbs Down Icon
    V
    vijaya kumar Telugu
    Introduction to Information Security
    Offered by Great Learning
    5
    Learning Experience: basic of information security i learn
    Faculty: Instructors taught well Curriculum was relevant and comprehensive
    Course Support: Career support was helpful
    Reviewed on 21 Apr 2022Read More
    Thumbs Up IconThumbs Down Icon
    View All 4 ReviewsRight Arrow Icon
    qna

    Introduction to Information Security
     at 
    Great Learning 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...