- Level Awareness
- Course by Tel Aviv University
- Total students 1,302 enrolled
-
Offered by
About
Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back.
In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.
You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.
You will then combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics. Finally, you will learn about the most critical vulnerability of all times - Buffer Overflow.
This course was produced at Tel Aviv University by TAU Online - learning innovation center.
What you will learn
- Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
- An overview of cryptography with an emphasis on symmetric ciphers.
- A high-level examination of hash functions and an overview of common hash algorithms.
- A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
- An overview of the most critical vulnerability of all times - buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP
Auto Summary
Unlocking Information Security I: From Cryptography to Buffer Overflows offers an in-depth dive into the fundamental concepts and terminology of information security, a critical field in today's digitized world. As cyber threats like data breaches and cyber warfare become increasingly prevalent, understanding how hackers operate and how to defend against them is essential. This course, the first part of the Unlocking Information Security program, is designed to introduce learners to various types of vulnerabilities through well-known examples of design flaws, implementation bugs, and social engineering attacks. Participants will explore the fascinating world of cryptography, tracing its evolution from ancient times to modern-day encryption techniques. Essential cryptographic concepts, such as famous ciphers and hash functions, will be covered, including how they work, their vulnerabilities, and how to protect against attacks. The course will also delve into different authentication mechanisms, including passwords, challenge-response systems, and biometric methods. Finally, learners will tackle the critical issue of Buffer Overflow, one of the most significant vulnerabilities in software security. Produced by Tel Aviv University's TAU Online - learning innovation center, this course is available through edX and targets individuals at the awareness level. While the course duration is flexible, learners can start with a Starter subscription to begin their journey in mastering the essentials of information security. This course is ideal for anyone looking to gain a foundational understanding of how to secure information systems against a myriad of cyber threats.

Avishai Wool

Dan Gittik