inflearn logo

Information Security

This course aims to understand various security threats occurring in information systems, particularly in internet environments, and to learn core security technologies to protect against them. Focusing on key cryptographic techniques such as symmetric and asymmetric key cryptography, the course is structured to provide a systematic understanding of the overall flow of information security, including the underlying mathematical concepts of cryptography.

2 learners are taking this course

Level Beginner

Course period Unlimited

Network
Network
Cryptography
Cryptography
Network
Network
Cryptography
Cryptography
Thumbnail

What you will gain after the course

  • You can systematically understand the core concepts of information security and security threats.

  • I can understand and explain the basic principles of symmetric and asymmetric key cryptography and cryptographic mathematics.


Information security
isn't difficult!



Are you feeling anxious about potential security threats in the online world?
With so many security technologies, were you unsure where to even begin?
The Pukyong National University Institute of Software Convergence Innovation will guide you clearly through a systematic curriculum.
From complex cryptographic mathematics to practical applications of symmetric and asymmetric keys,
seize the opportunity to take your information security capabilities to the next level.



What you can gain from this course

Gain a deep understanding of the core principles of information security.

Clearly identify real-world security threats and develop the insight to establish systematic defense strategies. You will come to understand the overall flow of information security by analyzing various attack scenarios in the internet environment.

Learn the fundamental principles of symmetric and public-key cryptography step-by-step, from cryptographic mathematics to practical application. You will clearly understand how complex algorithms work and develop cryptographic thinking skills.

From information security beginners to job seekers, this course is designed to help you build practical security capabilities. By explaining complex concepts clearly, you can establish a solid foundation in the field of information security.

We will be your guide as you grow into an information security expert.
We promise a systematic acquisition of knowledge.


Did information security feel only difficult to you?


You must have felt overwhelmed by the complex world of information systems, especially in the face of the security threats pouring in from the internet environment.

If you have been confused about where to start or what technologies are needed in the face of these threats, it is now time to relieve those concerns.

It is because there was a lack of systematic learning.

If the foundation is shaky, the tower of security will also crumble.

It is important to understand the big picture of information security by building a solid foundation in the basic principles of cryptography and network security.

Now, with the Pukyong National University Institute of Software Convergence Innovation, you will clearly grasp the core principles of information security and acquire the expertise to respond to real-world threats.


This course helps you grow into an information security expert. Gain confidence based on a solid foundation. Get started right now!

Syllabus

Mastering Core Information Security Technologies

Section 1

Overview and Fundamentals of Information Security

This section introduces the overall concepts and importance of information security and helps provide an understanding of major security threats in the internet environment. Additionally, it explains the core terminology and principles necessary to build a solid foundation for learning information security.

Section 2

Symmetric-key Cryptography

Learn the operating principles and characteristics of various symmetric key encryption algorithms, such as stream ciphers, DES, and AES. It also covers the practical applications of block ciphers in depth.

Section 3

Public Key Cryptography (Asymmetric Key)

Explain the basic principles of public-key cryptography and explore the mathematical foundations and application cases of the RSA cryptosystem and ECC (Elliptic Curve Cryptography). Understand the importance of the discrete logarithm problem.

Section 4

Authentication and Integrity

Learn the principles and applications of digital signatures, hash functions, and MAC (Message Authentication Code), which are core technologies for ensuring data reliability. Through this, understand information integrity and authentication procedures.

Section 5

Key Summary and Key Management

This section comprehensively summarizes the course content and covers essential key management and key establishment methods for operating information security systems. It provides practical knowledge for building secure information security systems.

Recommended Audience

Recommended for these people

First Steps in Information Security: Introduction to Core Security Technologies

IT majors, job seekers in information security

Notes before taking the course


Hands-on Environment

  • No separate setup for a practice environment is required.

  • A web browser is required to view the lecture notes and example codes.

  • Basic PC specifications are recommended for understanding concepts related to networks and cryptography.

Prerequisites and Notes

  • It is helpful to have basic knowledge of computer science or IT.

  • Prior experience in the information security field is not required, but it can be helpful for learning.

  • A strong willingness to learn basic theories of cryptography and security is important.


Recommended for
these people

Who is this course right for?

  • Students majoring in Computer Science and IT-related fields

  • A beginner learning information security for the first time

  • Job seekers interested in the security field (information security, network, etc.)

  • Learners who want to understand the basic theories of cryptography and security

Need to know before starting?

  • A basic understanding of computer and internet usage is sufficient.

  • No prior knowledge is required.

Hello
This is aisw

105

Learners

5

Reviews

5.0

Rating

4

Courses

Institute of Software Convergence Innovation, Pukyong National University

Curriculum

All

13 lectures ∙ (16hr 38min)

Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

aisw's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!

Free