Unlocking Information Security: Part 2

Continue learning how systems are hacked and defended.

Created by: Dan Gittik

icon
Quality Score

Content Quality
/
Video Quality
/
Qualified Instructor
/
Course Pace
/
Course Depth & Coverage
/

Overall Score : 0 / 100

icon
Live Chat with CourseDuck's Co-Founder for Help

Need help deciding on a hacking course? Or looking for more detail on Dan Gittik's Unlocking Information Security: Part 2? Feel free to chat below.
Join CourseDuck's Online Learning Discord Community

icon
Course Description

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think and act, and how you can fight back.
In this course, which is the second part of the Unlocking Information Security program, you will learn about the most critical vulnerability of all times - the buffer overflow. Then, you will turn your attention to the Internet: you'll start by learning about the inherent vulnerabilities lurking in the multiple layers of the Internet's protocol stack and then meet the first line of internet defenses. Next, you'll take an in-depth look at the modern cryptographic concepts that are at the core of internet security and discover the mathematical miracle that makes them possible.
With all this in mind, you will take a deep survey of the world wide web; understand the various technologies behind websites, how web servers and web browsers interact, how they can be attacked, and how they should be defended. Finally, you will learn about viruses, worms and trojans: what they are, how they spread, hide and attack, and the arms-race between them and the anti-virus industry.
This course was produced at Tel Aviv University by TAU Online - learning innovation center.

icon
Instructor Details

Dan Gittik

Dan Gittik is an alumnus of the cyber division in the Ministry of Defense and a lecturer in information security in Tel-Aviv University. Dan has broad teaching experience from the military, the industry, and the academy.

icon
Reviews

0.0

0 total reviews

5 star 4 star 3 star 2 star 1 star
% Complete
% Complete
% Complete
% Complete
% Complete