Ir al contenido principal

TAUx, IsraelX: Unlocking Information Security I: From Cryptography to Buffer Overflows

Learn how systems are hacked and defended.

Unlocking Information Security I: From Cryptography to Buffer Overflows
5 semanas
4–6 horas por semana
A tu ritmo
Avanza a tu ritmo
Gratis
Verificación opcional disponible

Hay una sesión disponible:

Una vez finalizada la sesión del curso, será archivadoAbre en una pestaña nueva.
Comienza el 17 may
Termina el 31 ago

Sobre este curso

Omitir Sobre este curso

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

You will then combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics. Finally, you will learn about the most critical vulnerability of all times - Buffer Overflow.

This course was produced at Tel Aviv University by TAU Online - learning innovation center.

Curso creado con el apoyo de

Check Point

De un vistazo

  • Institutions TAUxIsraelX
  • Subject Informática
  • Level Intermediate
  • Prerequisites
    • The course includes optional programming exercises that require familiarity with the Python programming language. While the course can be completed with great benefit without solving them, we highly recommend you give them a try.

    • The course also assumes some mathematical maturity, including algebra, basic combinatorics, and probability.

  • Language English
  • Video Transcripts اَلْعَرَبِيَّةُ, English, עברית
  • Associated programs

Lo que aprenderás

Omitir Lo que aprenderás
  • Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
  • An overview of cryptography with an emphasis on symmetric ciphers.
  • A high-level examination of hash functions and an overview of common hash algorithms.
  • A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
  • An overview of the most critical vulnerability of all times - buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP

Testimonios de los estudiantes

Omitir Testimonios de los estudiantes
  • Great presentation. Clear lectures. Loved the graphical elements used to illustrate the coursework. I would love to see more courses from these guys.
  • Top-notch course, with good teaching and excellent feedback using the quizzes, etc. I am glad to have found this gem of an online CS class!
  • I have been in software development for 25 years but I felt like this course enhanced my understanding of computing basics tremendously. I would sign-up for part III and IV tomorrow if it was available.

¿Quién puede hacer este curso?

Lamentablemente, las personas residentes en uno o más de los siguientes países o regiones no podrán registrarse para este curso: Irán, Cuba y la región de Crimea en Ucrania. Si bien edX consiguió licencias de la Oficina de Control de Activos Extranjeros de los EE. UU. (U.S. Office of Foreign Assets Control, OFAC) para ofrecer nuestros cursos a personas en estos países y regiones, las licencias que hemos recibido no son lo suficientemente amplias como para permitirnos dictar este curso en todas las ubicaciones. edX lamenta profundamente que las sanciones estadounidenses impidan que ofrezcamos todos nuestros cursos a cualquier persona, sin importar dónde viva.

Este curso es parte del programa Unlocking Information Security Professional Certificate

Más información 
Instrucción por expertos
2 cursos de capacitación
A tu ritmo
Avanza a tu ritmo
3 meses
4 - 6 horas semanales

¿Te interesa este curso para tu negocio o equipo?

Capacita a tus empleados en los temas más solicitados con edX para Negocios.