• Duración:
    7 semanas
  • Dedicación:
    4–6 horas por semana
  • Precio:

    GRATIS
    Agregar un Certificado Verificado por $149 USD

  • Instituciones
  • Tema:
  • Nivel:
    Intermediate
  • Idioma:
    English
  • Transcripciones de video:
    اللغة العربية, English, עברית
  • Tipo de curso:
    A tu ritmo

Programas asociados:

Prerrequisitos

  • Complete the first part of the course - Unlocking Information Security: Part Ⅰ.

  • The course includes optional programming exercises that require familiarity with the Python programming language. While the course can be completed with great benefit without solving them, we highly recommend you give them a try.

  • The course also assumes some mathematical maturity, including algebra, basic combinatorics, and probability.

Premios

edX Prize 2020

Sobre este curso

Omitir Sobre este curso

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the second part of the Unlocking Information Security program, you will turn your attention to the Internet: you'll start by learning about the inherent vulnerabilities lurking in the multiple layers of the Internet's protocol stack and then meet the first line of internet defenses. Next, you'll take an in-depth look at the modern cryptographic concepts that are at the core of internet security and discover the mathematical miracle that makes them possible.

With all this in mind, you will take a deep survey of the world wide web; understand the various technologies behind websites, how web servers and web browsers interact, how they can be attacked, and how they should be defended. Finally, you will learn about viruses, worms and trojans: what they are, how they spread, hide and attack, and the arms-race between them and the anti-virus industry.

This course was produced at Tel Aviv University by TAU Online - learning innovation center.

Lo que aprenderás

Omitir Lo que aprenderás
  • An introduction to the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and useful defenses against them like NAT Boxes and Firewalls
  • An in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital Signatures and MAC
  • A survey of the world wide web's security concerns (SQL Injections, CSRF, and XSS): is the Internet ultimately vulnerable or is there a silver lining?
  • An introduction to the world of malware: viruses, worms, Trojans and more - computer viruses and how to beat them

Conoce a tus instructores

Avishai Wool
Professor
Tel Aviv University
Dan Gittik
Lecturer
Tel Aviv University

Curso creado con el apoyo de

Check Point

Obtén un Certificado Verificado para destacar los conocimientos y las habilidades que adquieras
$149 USD

Ver un modelo de certificado de edX en PDF
  • Oficial y verificado

    Obtén un certificado con la firma del instructor y el logotipo de la institución para demostrar tus logros y aumentar las posibilidades de conseguir trabajo

  • Fácil de compartir

    Agrega el certificado a tu currículum o publícalo directamente en LinkedIn

  • Incentivo comprobado

    El certificado te da un motivo más para completar el curso

  • Apoya nuestra labor

    edX, una organización sin fines de lucro, se sustenta con los certificados verificados para financiar la educación gratuita para todo el mundo

Testimonios de los estudiantes

  • Very high quality class. Help to understand complex problems in a very clear way. Videos are short, very clear and straight to the point. Relevant real world examples are provided for each security concept or attack. The supplementary material at the end of each chapter is very helpful to dig further.
  • I was able to understand everything and complete all the exercises, and had fun doing so. I have no idea if there are many companies working with infosec where I am (Brazil) but this was so enjoyable that I now dream of some day working in the field... Thank you!
  • Very useful and simple to understand course. It gives the information about security techniques, networks and viruses, cryptography etc. It was highly interesting as well. Thanks for excellent lessons!

¿Quién puede hacer este curso?

Lamentablemente, las personas de uno o más de los siguientes países o regiones no podrán registrarse para este curso: Irán, Cuba y la región de Crimea en Ucrania. Si bien edX consiguió licencias de la Oficina de Control de Activos Extranjeros de los EE. UU. (U.S. Office of Foreign Assets Control, OFAC) para ofrecer nuestros cursos a personas en estos países y regiones, las licencias que hemos recibido no son lo suficientemente amplias como para permitirnos dictar este curso en todas las ubicaciones. edX lamenta profundamente que las sanciones estadounidenses impidan que ofrezcamos todos nuestros cursos a cualquier persona, sin importar dónde viva.