Overall Score : 0 / 100
Live Chat with CourseDuck's Co-Founder for Help
In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.
You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.
Finally, you will combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics.
This course was produced at Tel Aviv University by TAU Online - learning innovation center.
Dan Gittik is an alumnus of the cyber division in the Ministry of Defense and a lecturer in information security in Tel-Aviv University. Dan has broad teaching experience from the military, the industry, and the academy.