Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with Nanyang Technological University Center for Continuing Education.Full disclaimer.
About the course
Today over 10 billon smart devices are interconnected in cyberspace which has changed our way of lives and we have become more dependent on it. However, this dependency also makes us vulnerable, therefore, we need to make sure that the cyberspace is protected from cyber attackers as they can target individuals, companies and governments, and can cause hundreds of billions of dollars in losses every year. Therefore, there is a high demand worldwide for information security professionals to provide protection to individuals and organizations against growing threats from cyber attackers.
This subject intends to provide students with essential concepts of information security, cryptography, secure protocols, detection and other security techniques.
Information security concepts, threats and services. Security planning, technical and nontechnical aspects, policy based security, security approaches, security models, security strategies and security professionals.
Secret / Public-Key Cryptosystems
Classical ciphers. Data Encryption Standard (DES). Advanced Encryption Standard (AES). Modes of operation. Concepts of public-key cryptosystems. RSA. Secure Hash Standard (SHS). Digital Signature Standard (DSS).
Authentication protocols. Key exchange protocols. Identification protocols. Secret sharing. Secure Electronic Transaction (SET). Secure Socket Layer (SSL).
Electronic Election and Digital Money
Electronic election protocols. Untraceable digital coins. Divisible electronic cash. Electronic cash protocols. Micropayment systems.
Intrusion Detection, Social Networks and Cyber Security
Generic intrusion detection model. Host intrusion detection systems. Network intrusion detection systems. Database security. Information security awareness, education, social engineering, cyber bullying, social media and its impacts on the society, mobile security and cloud computing.
Who should attend
Anyone who is connected to internet and wants to upgrade his/her skills in information security area. This course will be beneficial for professionals making information security decisions in businesses and government departments, or individuals who need the expertise to make the right decisions to protect their organizations from cyber threats. No pre-requisite is needed for this course.
Trust the experts
Mohammed Yakoob Siyal
Dr Siyal received his B.E (1985) degree from Mehran University in Electronic Engineering, M.Sc (1988) and PhD (1991) degrees in Electrical and Electronic Engineering from the University of Manchester Institute of Science and technology (UMIST), England and an MBA (2000) from Surrey European Manag...