Unlocking Information Security I: From Cryptography to Buffer Overflows (edX)

Unlocking Information Security I: From Cryptography to Buffer Overflows is an Online Course, Offered by Tel Aviv University via edX.

Enroll In Course

Be ahead to learn something new Today

  • Flexible Online Learning
  • Verified Certificate*
  • Add powers to your Resume
  • Access course Anytime, Anywhere
Unlocking Information Security I: From Cryptography to Buffer Overflows edX
Unlocking Information Security I: From Cryptography to Buffer Overflows (edX)

Unlocking Information Security I: From Cryptography to Buffer Overflows (edX)

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyberattacks, data breaches, and even cyber warfare are all very real – so it is infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs, and social engineering.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

This course was produced at Tel Aviv University by TAU Online – learning innovation center.

Syllabus

  • Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case study (namely, Meltdown).
  • An overview of cryptography with an emphasis on symmetric ciphers.
  • A high-level examination of hash functions and an overview of common hash algorithms.
  • A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
  • An overview of the most critical vulnerability of all times – buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP

Teacher

Avishai Wool and Dan Gittik

Additional information

Course Delivery

Online

Course Efforts

4 hours/week

Course Enrollment

Free

Course Language

English

Course Length

5 Weeks

Course Level

Intermediate

Course Provider

Course School

Course Subtitles

Arabic, English, Hebrew

Flexible Learning

Yes

Verified Certificate

Paid

Reviews

There are no reviews yet.

Be the first to review “Unlocking Information Security I: From Cryptography to Buffer Overflows (edX)”

Your email address will not be published. Required fields are marked *