Introduction to Information Security
4.7 /5
- Offered byGreat Learning
Introduction to Information Security at Great Learning Overview
Introduction to Information Security
at Great Learning
Duration | 1 hour |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Introduction to Information Security at Great Learning Highlights
Introduction to Information Security
at Great Learning
- Earn a certificate of completion
Introduction to Information Security at Great Learning Course details
Introduction to Information Security
at Great Learning
What are the course deliverables?
- Information Security
- Hash
- Cryptography
- Breach and it's type
More about this course
- This Introduction to Information Security course is designed to give you insights on various aspects of securing your data
- The course begins with briefing the attacker's lifecycle and continues with explaining different case studies on popular companies, attack type, cause, and the ways they could have been prevented
- The course then explains breaches such as target breaches and password breaches
- It takes you through crucial attack vectors, defenses like holistic defense, security scorecards, do's and don'ts to save passwords, hash and its methods, custom hardware, control-flow integrity, and cryptographic approach for control flow integrity concepts
Introduction to Information Security at Great Learning Curriculum
Introduction to Information Security
at Great Learning
Attacker Lifecycle
Yahoo Breach
OPM Breach
Anthem Breach
JP Morgan Chase Breach
Target Breach
Key Attack Vectors & Defenses
Holistic Defense-In-Depth Approach
Security Score Card
Password Breaches
How to Store Passwords
How to Hash?
Why is Custom Hardware Faster?
Better Hashing Approach
Ballon Hashing
Control Flow Integrity
Cryptographic Control Flow Integrity
Q/A
Computer Security - Its applications and its future
Introduction to Information Security at Great Learning Admission Process
Introduction to Information Security
at Great Learning
Important Dates
Nov 30, 2024
Course Commencement Date
Other courses offered by Great Learning
₹3.5 L
5 months
– / –
₹97 K
4 months
– / –
₹2.75 L
12 months
– / –
₹2.75 L
12 months
– / –
View Other 1225 Courses
G
Geethika Gondi
Introduction to Information Security
Offered by Great Learning
5
Learning Experience: Course content is sufficient for beginners, platform was online and recorded vedios, if u listen carefully it will helpfull. After completion of course they will provide a quiz and certification.
Faculty: Their is no faculty for great learning app. Those are all recorded vedios
Their course curriculum is very clear. I like it very much. They provide examples with pictures
Course Support: Knowledge about the topics
Reviewed on 28 Jan 2023Read More
P
Prabhjotsingh Chalhotra
Introduction to Information Security
Offered by Great Learning
4
Learning Experience: Compete framework covers not only a comprehensive training program to prepare you for the certification exam, but also the industry's most robust, in-depth, hands-on lab experience of any cybersecurity program available. C|EH v12 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organizations.
Faculty: A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).
To become a CEH and attain this certification, you need to master certain skills and concepts such as penetration testing, foot printing and reconnaissance, and social engineering. In Official CEH Training, the course covers backdoors, viruses, Trojan horses, and worms. Also, it includes modules on “ SQL injections, Session hijacking, Denial of Service (DoS) attacks, and system hacking. You may also want to learn how to scan and sniff networks, crack the wireless encryption, and evade IDS and honeypots and firewalls.
Reviewed on 6 Nov 2022Read More
S
Sameera D
Introduction to Information Security
Offered by Great Learning
5
Learning Experience: Very good platform for learners
Faculty: Quality of lectures are also very good
They make concepts very clear in simple and understandable language
Course Support: No career support provided
Reviewed on 1 Jul 2022Read More
V
vijaya kumar Telugu
Introduction to Information Security
Offered by Great Learning
5
Learning Experience: basic of information security i learn
Faculty: Instructors taught well
Curriculum was relevant and comprehensive
Course Support: Career support was helpful
Reviewed on 21 Apr 2022Read More
View All 4 Reviews
Introduction to Information Security
at Great Learning
Student Forum
Anything you would want to ask experts?
Write here...Introduction to Information Security at Great Learning News & Updates
Introduction to Information Security
at Great Learning
Latest
Popular