Free Information Security Course with Certificate
Introduction to Information Security
Enrol for this comprehensive and hands-on free online training to master information security fundamentals. Led by our experts, this course covers various topics, including different breach types, in-depth hashing and more!
Skills you’ll Learn
About this Course
In this course, we will explore the world of information security and equip you with the essential knowledge to protect digital assets. We'll dive deep into real-world breaches, studying their implications and understanding how attackers operate. From the notorious Yahoo, OPM, Anthem, and JP Morgan Chase, to the infamous Target breach, we'll analyze the attacker lifecycle and the key attack vectors employed. You'll learn about effective defense strategies through a holistic defense-in-depth approach. We'll cover the Security Score Card, password breaches, and how to store and hash passwords securely. Ever wondered why custom hardware is faster? We'll uncover its reasons and explore better hashing approaches like Ballon Hashing.
We'll also delve into advanced topics such as Control Flow Integrity and Cryptographic Control Flow Integrity, providing insights into protecting software from malicious manipulation. Throughout the course, we encourage your participation in Q&A sessions to address any doubts. We'll also discuss the wide-ranging applications of computer security and explore its exciting future.
After this free, self-paced, beginner-level guide to Information Security, you can enroll in the Cyber Security courses and embark on your career with the professional Post Graduate certificate and learn various concepts in depth with millions of aspirants across the globe!
Course Outline
This section shall briefly discuss a hacker's life cycle and its different stages and then explain the traditional approach they use in this section.
This section discusses a Yahoo breach case study and encloses the figures on what got stolen, its impact, approach, and the root cause for the breach.
This section discusses the Office of Personnel Management breach case study and encloses figures and statistics on what got stolen, its impact, approach, the root cause, and the way through which the breach could have been prevented.
This section discusses the Anthem breach case study and encloses figures and statistics on what got stolen, its impact, approach, the root cause, key vulnerabilities, and the way through which the breach could have been prevented.
This section discusses the JP Morgan Chase breach case study, and encloses figures and statistics on what got stolen, its impact, approach, the root cause, key vulnerabilities, and the way through which the breach could have been prevented.