Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Online Course

Unlocking Information Security: Part Ⅰ

Tel Aviv University via edX

(99)

Taken this course? Share your experience with other students. Write review

Overview

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

Finally, you will combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics.

This course was produced at Tel Aviv University by TAU Online - learning innovation center.

Taught by

Avishai Wool and Dan Gittik

Help Center

Most commonly asked questions about EdX

Reviews for edX's Unlocking Information Security: Part Ⅰ Based on 99 reviews

  • 5 stars 89%
  • 4 stars 8%
  • 3 star 1%
  • 2 star 1%
  • 1 star 1%

Did you take this course? Share your experience with other students.

Write a review
  • 1
Anonymous
Anonymous is taking this course right now.
This course is amazing! First of all - the content is great, clear and profound, making complicated issues accessible and understandable. Furthermore, the lecturers are great, they are real experts and yet they seem approachable. The effort and thought that were put into this course really make it stand out, the explanations, the animations, I took many online courses before and none of them was as good as this one.
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
The moment the thought of cyber security came to my mind it was Israel that occupied my mind.Consequently I decided to take this course by TAU at EdX.The lucid explanation and effective teaching style of both the educators are worth mentioning.I was deeply impressed by the manner of teaching.Hope the journey continues.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Most amazing course I have taken. Though it does not teach actual hacking at professional level , it teaches about all the attacks which can be made by hackers and how to defend against them. You should also take it on https://www.edx.org/course/unlocking-information-security-part-i.
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
Thank you Prof. Avishai Wool and Dan Gitik for an AWESOME course!

Information Security just got a whole lot cooler than it already was.

Loving the examples and graphics (still trying to decide if I'm "Team Eve" or "Team Malory"...)
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
The course makes it simple to understand the theory and practice of information technologies.

I am interested in working in the cyber security world and this course really help me take my forst steps towards that.

Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
Well explained, great lecturers. I wish they'll do more courses like that one.

It's a wonderful way to get and learn the complexity in the cyber world.
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
Excellent course! Fun, engaging and enlightening. I have not seen such a level of visual explanation in any MOOC before. The verbal explanations are also very precise and interesting
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
talks in general about a lot of internet security issues for a user includes some coding in python to get a feeling of the encryption and its vulnerabilities
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
So far, this course has been very good! The teachers are great, and they teach applicable lessons in creative ways, exploring the field of information security.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Wow brilliant technology you bring us actually attacking And defending systems in the real world not just theoretical stuff

Thank you very much

Yehuda m
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Very good course. This is a must for starters.

All the concepts have been greatly explained in detail with a lot of visualization.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Awesome course! Really great! Avishai and Dan are really super skilled and very nice guys and their explanations are always very clear! The course is not that easy, it requires and intermediate knowledge of computer systems and some skills in maths and probability inference techniques; it's highly recommended...
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
I do not have coding experience, i am kind of computer illiterate. I really appreciated taking this course because I am learning about safety in the digital world, which is a necessity nowadays. I wish more people will have access to this course, like put in on you tube. This course is balanced because there are difficult topics as well as relatable issues which I like. Giving out info to anyone requires responsibilities of the giver . It reminds me that ever since the Creation of man, there had always been and will always have a battle between good and evil. Man always need to devote his life and strength combating dark forces which prevent man from enjoying a free and happy existence. Thanks for this course of "Unlocking Information Security" because it is a support for people who may not know how to protect themselves. Thanks for giving me some momentum to be vigilant and take steps to help myself.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
The content of videos is OK. There is nothing wrong. But there are many problems that show low quality. 1) For the most videos it would be sufficient to me just to read the transcript. But only a few videos (the first ones, that have no much value) have transcript in English. All other videos have transcript in Jewish, no transcript in English. 2) Many exercises have very low quality of problem definitions. Based on answers it is clear what the authors meant, but they could not formulate their thoughts clearly. 3) Some exercises have actually multiple correct answers, but the authors don't execute the code and don't check the result; instead, their just check if you guessed what they think the answer is.

Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Ok, Great course, even for someone who moved away from coding (ahem a few years ago) I still dig out my O'reilly unix in a nutshell, along with sed/awk etc to see WTF is going on with my apple , Python is a super rich environment to do this stuff, permutations and itertools (way impressed!!), only managed so sort out python for this about 1/3 way into lesson and in retrospect I'd have gone the verified route, but never the less, super informative, well paced, good code challenges, very accessible presentation by both lecturers, I would recommend definitely, Cheers Pete Ryan
Was this review helpful to you? Yes
Gilad K
Gilad is taking this course right now, spending 3 hours a week on it and found the course difficulty to be medium.
I enjoy this course very much. I find it very interesting, well designed, relevant, clear and thorough. Suitable for novices and advanced students alike, though it does assume you're equipped with some knowledge in the computer world. The subjects the course discusses are the central topics to get oriented in this field. It comes from the world renowned Tel Aviv University. I would recommend this to anyone looking to get acquainted or strengthen her/his acquaintance with information security, encryption, cyber security building blocks, central concepts and significant trends.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Information delivery and content in this course is very strong. Working through the exercises provides vastly enhanced insight, possibly doubling course learning. For those of us primarily involved with software product delivery, this information is well suited to connect all the threats and mitigation in the story-line, from low-level computing, through infrastructure, and finally global exposure on the web (part II). As an ancillary note, I felt like I learned a lot of information in this course that enhanced my general computing knowledge for tasks outside security.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
As someone who had no experience with cybersecurity at all, I think the syllabus is a great introduction. It introduces new concepts with relatable examples, and gradually paints the bigger picture of cybersecurity. There are sufficient checkpoints to test our understanding of the subject.

However, you would need some experience in coding (python) to understand the course fully. I struggled a lot since you would be thrown into the water and you have to learn swimming on the spot. A easier worked example prior to the hands-on Hackxercise would have been great.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
The course provided a nice elementary but comprehensive introduction to the field of information security. It was very well edited and covered the necessary basics without delving too deep. There was quite a lot of Python programming involved to hammer in the concepts and it helped to truly grasp how they work. That part could be skipped but I am afraid that the value of the course would be greatly diminished by doing so. I recommend learning Python syntax and basic programming skills before taking this course, you will need it anyway. :)
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
1. The course must be made more easy for people who have not so strong IT background i.e. teach from layman's perspective

2. Add demonstration of vulnerabilities, attacks, exploits etc.

3. Switch from codebox to some other editor, I am a beginner programmer. While the code would work on my machine but it would fail for various reasons on codebox such as when the code is importing a library from a relative path. My code is working but codebox won't pass it hence I scored low in the hackxercizes and the final exam.
Was this review helpful to you? Yes
  • 1

Class Central

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free