mooc-course.com is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Unlocking Information Security I: From Cryptography to Buffer Overflows (edX)

Unlocking Information Security I: From Cryptography to Buffer Overflows (edX)

Key Facts

Hover in Table Body & click related link to explore more courses
Provider
School
Language
Level
edX
Tel Aviv University
English
Intermediate

By enrolling in this online course you will spend approx. 5 Weeks/4–6 hours per week to learn key concept of Cybersecurity.

Course Overview

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real – so it is infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

You will then combine everything you’ve learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics. Finally, you will learn about the most critical vulnerability of all times – Buffer Overflow.

This course was produced at Tel Aviv University by TAU Online – learning innovation center.

Course Syllabus

  • Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
  • An overview of cryptography with an emphasis on symmetric ciphers.
  • A high-level examination of hash functions and an overview of common hash algorithms.
  • A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
  • An overview of the most critical vulnerability of all times – buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP

Meet your Instructors

* We try to provide you as many free online courses from multiple providers and universities but in some cases you may have pay nominal fee to get assignments and/or to claim verified Certificate or Degree from respective provider.

Similar Cybersecurity MOOC Courses

Unlocking Information Security I: From Cryptography to Buffer Overflows (edX) Course Review

Already taken Unlocking Information Security I: From Cryptography to Buffer Overflows (edX) course? Share your review on MOOC course content, Certification, Assignment, Exam to help others.

{{ reviewsLength }} Review

{{ reviewsLength }} Reviews

{{ options.labels.newReviewButton }}
{{ canReviewMessage }}

Unlocking Information Security I: From Cryptography to Buffer Overflows (edX)

0.0/5

Share this Course

Share on facebook
Share on twitter
Share on linkedin
Share on whatsapp
Share on email