Unlocking Information Security: Part Ⅰ
date_range Starts on October 29, 2019
event_note End date December 10, 2019
list 5 sequences
assignment Level : Intermediate
chat_bubble_outline Language : English
language Subtitles : Arabic, Hebrew
card_giftcard 200 points
Users' reviews
-
starstarstarstarstar

Key information

credit_card Free access
verified_user Fee-based Certificate
timer 20 hours in total

About the content

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

Finally, you will combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics.

This course was produced at Tel Aviv University by TAU Online - learning innovation center.

more_horiz Read more
more_horiz Read less
report_problem

Prerequisite

  • The course includes optional programming exercises that require familiarity with the Python programming language. While the course can be completed with great benefit without solving them, we highly recommend you give them a try.

  • The course also assumes some mathematical maturity, including algebra, basic combinatorics, and probability.

dns

Syllabus

  • Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
  • An overviewof cryptography with an emphasis on symmetric ciphers.
  • A high-level examination of hash functions and an overview of common hash algorithms.
  • A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
record_voice_over

Instructors

Avishai Wool
Professor
IsraelX

Dan Gittik
Lecturer
IsraelX

assistant

Platform

Edx

Harvard University, the Massachusetts Institute of Technology, and the University of California, Berkeley, are just some of the schools that you have at your fingertips with EdX. Through massive open online courses (MOOCs) from the world's best universities, you can develop your knowledge in literature, math, history, food and nutrition, and more. These online classes are taught by highly-regarded experts in the field. If you take a class on computer science through Harvard, you may be taught by David J. Malan, a senior lecturer on computer science at Harvard University for the School of Engineering and Applied Sciences. But there's not just one professor - you have access to the entire teaching staff, allowing you to receive feedback on assignments straight from the experts. Pursue a Verified Certificate to document your achievements and use your coursework for job and school applications, promotions, and more. EdX also works with top universities to conduct research, allowing them to learn more about learning. Using their findings, edX is able to provide students with the best and most effective courses, constantly enhancing the student experience.

You are the designer of this MOOC?
What is your opinion on this resource ?
Content
0/5
Platform
0/5
Animation
0/5