Save for later

Unlocking Information Security I

Unlocking Information Security,

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

You will then combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics. Finally, you will learn about the most critical vulnerability of all times - Buffer Overflow.

This course was produced at Tel Aviv University by TAU Online - learning innovation center.

What you'll learn

  • Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
  • An overview of cryptography with an emphasis on symmetric ciphers.
  • A high-level examination of hash functions and an overview of common hash algorithms.
  • A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
  • An overview of the most critical vulnerability of all times - buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP
  • Great presentation. Clear lectures. Loved the graphical elements used to illustrate the coursework. I would love to see more courses from these guys.
  • Top-notch course, with good teaching and excellent feedback using the quizzes, etc. I am glad to have found this gem of an online CS class!
  • I have been in software development for 25 years but I felt like this course enhanced my understanding of computing basics tremendously. I would sign-up for part III and IV tomorrow if it was available.

Get Details and Enroll Now

OpenCourser is an affiliate partner of edX and may earn a commission when you buy through our links.

Get a Reminder

Send to:
Rating Not enough ratings
Length 5 weeks
Effort 4 - 6 hours per week
Starts On Demand (Start anytime)
Cost $149
From IsraelX, TelAvivUniversity, Tel Aviv University via edX
Instructors Avishai Wool, Dan Gittik
Download Videos On all desktop and mobile devices
Language English
Subjects Programming
Tags Computer Science TelAvivUniversity

Get a Reminder

Send to:

Similar Courses

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile.

INFORMATION SECURITY DEVELOPER_INDENT - IT Security $47k

Information Security Office $71k

Information Security 1 $72k

Head, Information Security $72k

Information Security Analyst 2 3 $81k

Information Security Apprentice $84k

Engineer, Information Security $89k

Security Information Analyst $91k

Information Security Administration $108k

Information Technology/ Security $113k

Information Security - IT Specialist $121k

Information Security Expert $130k

Write a review

Your opinion matters. Tell us what you think.

Rating Not enough ratings
Length 5 weeks
Effort 4 - 6 hours per week
Starts On Demand (Start anytime)
Cost $149
From IsraelX, TelAvivUniversity, Tel Aviv University via edX
Instructors Avishai Wool, Dan Gittik
Download Videos On all desktop and mobile devices
Language English
Subjects Programming
Tags Computer Science TelAvivUniversity

Similar Courses

Sorted by relevance

Like this course?

Here's what to do next:

  • Save this course for later
  • Get more details from the course provider
  • Enroll in this course
Enroll Now