• Length:
    5 Weeks
  • Effort:
    4–6 hours per week
  • Price:

    FREE
    Add a Verified Certificate for $99 USD

  • Institution
  • Subject:
  • Level:
    Intermediate
  • Language:
    English
  • Video Transcripts:
    اللغة العربية, English, עברית

Associated Programs:

Prerequisites

  • The course includes optional programming exercises that require familiarity with the Python programming language. While the course can be completed with great benefit without solving them, we highly recommend you give them a try.

  • The course also assumes some mathematical maturity, including algebra, basic combinatorics, and probability.

About this course

Skip About this course

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

Finally, you will combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics.

This course was produced at Tel Aviv University by TAU Online - learning innovation center.

What you'll learn

Skip What you'll learn
  • Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
  • An overviewof cryptography with an emphasis on symmetric ciphers.
  • A high-level examination of hash functions and an overview of common hash algorithms.
  • A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.

Meet your instructors

Avishai Wool
Professor
IsraelX
Dan Gittik
Lecturer
IsraelX

Pursue a Verified Certificate to highlight the knowledge and skills you gain $99.00

View a PDF of a sample edX certificate
  • Official and Verified

    Receive an instructor-signed certificate with the institution's logo to verify your achievement and increase your job prospects

  • Easily Shareable

    Add the certificate to your CV or resume, or post it directly on LinkedIn

  • Proven Motivator

    Give yourself an additional incentive to complete the course

  • Support our Mission

    EdX, a non-profit, relies on verified certificates to help fund free education for everyone globally

Who can take this course?

Unfortunately, learners from one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. EdX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.