We may earn an affiliate commission when you visit our partners.
Course image
Avishai Wool and Dan Gittik

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think and act, and how you can fight back.

Read more

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the second part of the Unlocking Information Security program, you will turn your attention to the Internet: you'll start by learning about the inherent vulnerabilities lurking in the multiple layers of the Internet's protocol stack and then meet the first line of internet defenses. Next, you'll take an in-depth look at the modern cryptographic concepts that are at the core of internet security and discover the mathematical miracle that makes them possible.

With all this in mind, you will take a deep survey of the world wide web; understand the various technologies behind websites, how web servers and web browsers interact, how they can be attacked, and how they should be defended. Finally, you will learn about viruses, worms and trojans: what they are, how they spread, hide and attack, and the arms-race between them and the anti-virus industry.

This course was produced at Tel Aviv University by TAU Online - learning innovation center.

What you'll learn

  • An introduction to the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and useful defenses against them like NAT Boxes and Firewalls
  • An in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital Signatures and MAC
  • A survey of the world wide web's security concerns (SQL Injections, CSRF, and XSS): is the Internet ultimately vulnerable or is there a silver lining?
  • An introduction to the world of malware: viruses, worms, Trojans and more - computer viruses and how to beat them

Three deals to help you save

What's inside

Learning objectives

  • An introduction to the typical internet protocol stack vulnerabilities, including ip spoofing, tcp injections, and ddos, and useful defenses against them like nat boxes and firewalls
  • An in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the internet: diffie-hellman key exchange, rsa public-key cryptography, digital signatures and mac
  • A survey of the world wide web's security concerns (sql injections, csrf, and xss): is the internet ultimately vulnerable or is there a silver lining?
  • An introduction to the world of malware: viruses, worms, trojans and more - computer viruses and how to beat them

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides a multifaceted study of internet and cybersecurity, offering foundational knowledge for beginners
Teaches cryptographic concepts and techniques, which are crucial for securing internet communications and data
Examines the vulnerabilities of the internet protocol stack and common defenses like firewalls and NAT boxes
Offers a practical survey of the world wide web, including security concerns like SQL injections, CSRF, and XSS
Provides an in-depth look at malware, including viruses, worms, and Trojans, and explores strategies for protection

Save this course

Save Unlocking Information Security II: An Internet Perspective to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Unlocking Information Security II: An Internet Perspective with these activities:
Review network basics
Refresh your understanding of networking concepts, such as IP addressing, TCP/IP, and network security, to prepare for this course.
Browse courses on Network Fundamentals
Show steps
  • Review lecture notes or textbooks on networking basics.
  • Practice configuring network settings on a local computer or virtual machine.
Cryptographic Concepts Practice Set
Practice applying cryptographic concepts and techniques to solidify understanding.
Show steps
  • Solve a set of practice problems involving Diffie-Hellman Key Exchange.
  • Complete a series of exercises on RSA Public-Key Cryptography.
  • Work through examples of Digital Signatures and MAC.
Build a Basic Firewall
Develop a hands-on understanding of firewall implementation and network security.
Browse courses on Firewalls
Show steps
  • Configure a software firewall using iptables or a similar tool.
  • Define rules to allow and deny network traffic.
  • Test the firewall's effectiveness against simulated attacks.
Show all three activities

Career center

Learners who complete Unlocking Information Security II: An Internet Perspective will develop knowledge and skills that may be useful to these careers:
Ethical Hacker
This course may be useful for an Ethical Hacker. It covers a variety of topics related to cybersecurity, including the typical Internet protocol stack vulnerabilities, cryptographic concepts and techniques, and the world of malware. Ethical Hackers are responsible for testing the security of an organization's computer systems and networks. They must have a strong understanding of cybersecurity and the latest threats and trends.
Incident Response Manager
This course may be useful for an Incident Response Manager. It covers a variety of topics related to cybersecurity, including the typical Internet protocol stack vulnerabilities, cryptographic concepts and techniques, and the world of malware. Incident Response Managers are responsible for responding to and managing cybersecurity incidents. They must have a strong understanding of cybersecurity and the latest threats and trends.
Security Architect
This course may be useful for a Security Architect. It covers a variety of topics related to cybersecurity, including the typical Internet protocol stack vulnerabilities, cryptographic concepts and techniques, and the world of malware. Security Architects are responsible for designing and implementing security solutions for organizations. They must have a strong understanding of cybersecurity and the latest threats and trends.
Network Security Engineer
This course may be useful for a Network Security Engineer. It covers a variety of topics related to cybersecurity, including the typical Internet protocol stack vulnerabilities, cryptographic concepts and techniques, and the world of malware. Network Security Engineers are responsible for securing computer networks. They must have a strong understanding of cybersecurity and the latest threats and trends.
Information Technology Auditor
This course may be useful for an Information Technology Auditor. It covers a variety of topics related to cybersecurity, including the typical Internet protocol stack vulnerabilities, cryptographic concepts and techniques, and the world of malware. Information Technology Auditors are responsible for auditing an organization's information technology systems and networks. They must have a strong understanding of cybersecurity and the latest threats and trends.
Cloud Security Engineer
This course may be useful for a Cloud Security Engineer. It covers a variety of topics related to cybersecurity, including the typical Internet protocol stack vulnerabilities, cryptographic concepts and techniques, and the world of malware. Cloud Security Engineers are responsible for securing cloud computing environments. They must have a strong understanding of cybersecurity and the latest threats and trends.
Software Engineer
This course may be useful for a Software Engineer. The course takes an in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital Signatures and MAC. This could be useful for a Software Engineer, as they are responsible for designing, developing, and maintaining software applications. A deeper understanding of the principles of cryptography enables a Software Engineer to design more secure and reliable applications.
IT Security Manager
This course may be useful for an IT Security Manager. It covers a variety of topics related to cybersecurity, including the typical Internet protocol stack vulnerabilities, cryptographic concepts and techniques, and the world of malware. IT Security Managers are responsible for overseeing the security of an organization's information technology systems and networks. They must have a strong understanding of cybersecurity and the latest threats and trends.
Cybersecurity Consultant
This course may be useful for a Cybersecurity Consultant. It covers a variety of topics related to cybersecurity, including the typical Internet protocol stack vulnerabilities, cryptographic concepts and techniques, and the world of malware. Cybersecurity Consultants help organizations to improve their cybersecurity posture and reduce their risk of being hacked. They must have a strong understanding of cybersecurity and the latest threats and trends.
Security Engineer
This course may be useful for a Security Engineer. It analyzes the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and useful defenses against them like NAT Boxes and Firewalls. This information is useful because Security Engineers are responsible for a variety of tasks, including securing computer systems, networks, and data. They must be knowledgeable about the latest security threats and trends in order to effectively protect their organizations.
Systems Administrator
This course may be useful for a Systems Administrator. The course emphasizes the security risks associated with the world wide web (SQL Injections, CSRF, and XSS). This can be especially useful for a Systems Administrator, as they are responsible for maintaining computer systems and networks. A deeper understanding of these security risks enables a Systems Administrator to more effectively protect systems from attack.
Computer Network Architect
This course may be useful for a Computer Network Architect. It takes an in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet, including Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital Signatures and MAC. This could be useful for a Computer Network Architect, as they are responsible for designing, implementing, and maintaining computer networks. They must have a strong understanding of the protocols and technologies used in networking, as well as the security risks associated with them.
Information Security Analyst
This course may be useful for an Information Security Analyst. It covers the world of malware, including viruses, worms, and Trojans. Information Security Analysts are responsible for protecting computer systems and networks from security threats. They must have a strong understanding of the latest security threats and trends in order to effectively protect their organizations.
Systems Engineer
This course may be useful for a Systems Engineer. Knowledge of the Internet protocol stack vulnerabilities would be valuable. Systems Engineers are responsible for designing, implementing, and maintaining computer systems. They must have a strong understanding of the latest technologies and trends in order to effectively design and maintain systems.
Web Developer
This course could be useful for a Web Developer. The course surveys the world wide web's security concerns (SQL Injections, CSRF, and XSS). This could be useful for a Web Developer, as they are responsible for designing, developing, and maintaining websites. A deeper understanding of how the Internet works enables a Web Developer to create more secure and reliable websites.

Reading list

We've selected 21 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Unlocking Information Security II: An Internet Perspective.
Is widely considered to be the 'bible' of computer security. It covers all aspects of computer security, from the basics to advanced topics. It is essential reading for anyone who wants to learn about computer security.
Classic textbook on cryptography and network security. It provides a comprehensive overview of the field, and it is essential reading for anyone who wants to learn about these topics.
This comprehensive book on cryptography that covers the mathematical and implementation details of cryptographic algorithms. This course only scratches the surface of cryptography, so this book can provide a valuable deeper dive.
Practical guide to network security. It covers all aspects of network security, from the basics to advanced topics. It is essential reading for anyone who wants to learn about network security.
Detailed technical reference on the TCP/IP protocol stack. It great resource for understanding the inner workings of the Internet.
Practical guide to hacking. It covers all aspects of hacking, from the basics to advanced topics. It is essential reading for anyone who wants to learn about hacking.
Very short introduction to cryptography. It covers all aspects of cryptography, from the basics to advanced topics. It is essential reading for anyone who wants to learn about cryptography.
Practical guide to web application security. It covers all aspects of web application security, from the basics to advanced topics. It is essential reading for anyone who wants to learn about web application security.
Practical guide to social engineering. It covers all aspects of social engineering, from the basics to advanced topics. It is essential reading for anyone who wants to learn about social engineering.
Comprehensive introduction to cryptography. It covers the history of cryptography, the different types of cryptographic algorithms, and the applications of cryptography.
Provides a detailed overview of classic web application security vulnerabilities including SQL injection, cross-site scripting, and cross-site request forgery. It valuable resource for learning how to secure web applications.
Fascinating look at the psychology of security. It covers all aspects of the psychology of security, from the basics to advanced topics. It is essential reading for anyone who wants to learn about the psychology of security.
Comprehensive guide to security engineering. It covers all aspects of security engineering, from the basics to advanced topics. It is essential reading for anyone who wants to learn about security engineering.
Comprehensive overview of information security. It covers the different aspects of information security, including risk management, cryptography, and network security.
Textbook on computer security. It covers all aspects of computer security, from the basics to advanced topics. It is essential reading for anyone who wants to learn about computer security.
Classic text on applied cryptography. It covers the different aspects of cryptography, including encryption, authentication, and digital signatures.
Is an overview of network security. It covers the different aspects of network security, including network attacks, encryption, and intrusion detection systems.
Textbook on computer security fundamentals. It covers all aspects of computer security fundamentals, from the basics to advanced topics. It is essential reading for anyone who wants to learn about computer security fundamentals.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Unlocking Information Security II: An Internet Perspective.
The Absolute Beginners Guide to Cyber Security 2024 -...
Most relevant
Securing Applications with AWS
Most relevant
Unlocking Information Security I: From Cryptography to...
What Are Viruses And How Do We Work With Them?
Viruses & How to Beat Them I: Introduction to Cell...
Introduction to Cyber Attacks
Immunology: Immune System and Infectious Diseases
Ethical Hacking: Malware Threats
Computer Science 101
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser