Professional Course

Unlocking Information Security I: From Cryptography to Buffer Overflows

edX, Online
Length
5 weeks
Price
149 USD
Next course start
Start anytime See details
Delivery
Self-paced Online
Length
5 weeks
Price
149 USD
Next course start
Start anytime See details
Delivery
Self-paced Online
Visit this course's homepage on the provider's site to learn more or book!

Course description

Unlocking Information Security I: From Cryptography to Buffer Overflows

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

You will then combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics. Finally, you will learn about the most critical vulnerability of all times - Buffer Overflow.

Upcoming start dates

1 start date available

Start anytime

  • Self-paced Online
  • Online
  • English

Who should attend?

Prerequisites

  • The course includes optional programming exercises that require familiarity with the Python programming language. While the course can be completed with great benefit without solving them, we highly recommend you give them a try.
  • The course also assumes some mathematical maturity, including algebra, basic combinatorics, and probability.

Course delivery details

This course is offered through IsraelX, a partner institute of EdX.

4-6 hours per week

Costs

  • Verified Track -$149
  • Audit Track - Free

Certification / Credits

What you'll learn

  • Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
  • An overview of cryptography with an emphasis on symmetric ciphers.
  • A high-level examination of hash functions and an overview of common hash algorithms.
  • A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
  • An overview of the most critical vulnerability of all times - buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP

Contact this provider

Contact course provider

Fill out your details to find out more about Unlocking Information Security I: From Cryptography to Buffer Overflows.

  Contact the provider

  Get more information

  Register your interest

Country *

reCAPTCHA logo This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
edX
141 Portland Street
02139 Cambridge Massachusetts

edX

edX For Business helps leading companies upskill their labor forces by making the world’s greatest educational resources available to learners across a wide variety of in-demand fields. edX For Business delivers high-quality corporate eLearning to train and engage your employees...

Read more and show all training delivered by this supplier

Ads