Preparing for Cybersecurity
Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with Nanyang Technological University Center for Continuing Education.Full disclaimer.
Today over 10 billon smart devices are interconnected in cyberspace which has changed our way of lives and we have become more dependent on it. However, this dependency also makes us vulnerable, therefore, we need to make sure that the cyberspace is protected from cyber attackers as they can target individuals, companies and governments, and can cause hundreds of billions of dollars in losses every year. Therefore, there is a high demand worldwide for information security professionals to provide protection to individuals and organizations against growing threats from cyber attackers.
This subject intends to provide students with essential concepts of information security, cryptography, secure protocols, detection and other security techniques.
Information security concepts, threats and services. Security planning, technical and nontechnical aspects, policy based security, security approaches, security models, security strategies and security professionals.
Secret / Public-Key Cryptosystems
Classical ciphers. Data Encryption Standard (DES). Advanced Encryption Standard (AES). Modes of operation. Concepts of public-key cryptosystems. RSA. Secure Hash Standard (SHS). Digital Signature Standard (DSS).
Authentication protocols. Key exchange protocols. Identification protocols. Secret sharing. Secure Electronic Transaction (SET). Secure Socket Layer (SSL).
Electronic Election and Digital Money
Electronic election protocols. Untraceable digital coins. Divisible electronic cash. Electronic cash protocols. Micropayment systems.
Intrusion Detection, Social Networks and Cyber Security
Generic intrusion detection model. Host intrusion detection systems. Network intrusion detection systems. Database security. Information security awareness, education, social engineering, cyber bullying, social media and its impacts on the society, mobile security and cloud computing.
Who should attend
Anyone who is connected to internet and wants to upgrade his/her skills in information security area. This course will be beneficial for professionals making information security decisions in businesses and government departments, or individuals who need the expertise to make the right decisions to protect their organizations from cyber threats. No pre-requisite is needed for this course.