Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Online Course

Unlocking Information Security: Part Ⅰ

Tel Aviv University via edX

(27)
112
Machine Learning & AI Diploma - 9 Months, Online Columbia Engineering Executive Education via EMERITUS AD

Taken this course? Share your experience with other students. Write review

Overview

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

Finally, you will combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics.

This course was produced at Tel Aviv University by TAU Online - learning innovation center.

Taught by

Avishai Wool and Dan Gittik

Class Central Charts

Help Center

Most commonly asked questions about EdX

Reviews for edX's Unlocking Information Security: Part Ⅰ Based on 27 reviews

  • 5 stars 81%
  • 4 stars 11%
  • 3 star 0%
  • 2 star 4%
  • 1 star 4%

Did you take this course? Share your experience with other students.

Write a review
  • 1
Anonymous
Anonymous is taking this course right now.
This course is amazing! First of all - the content is great, clear and profound, making complicated issues accessible and understandable. Furthermore, the lecturers are great, they are real experts and yet they seem approachable. The effort and thought that were put into this course really make it stand out, the explanations, the animations, I took many online courses before and none of them was as good as this one.
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
The moment the thought of cyber security came to my mind it was Israel that occupied my mind.Consequently I decided to take this course by TAU at EdX.The lucid explanation and effective teaching style of both the educators are worth mentioning.I was deeply impressed by the manner of teaching.Hope the journey continues.
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
Thank you Prof. Avishai Wool and Dan Gitik for an AWESOME course!

Information Security just got a whole lot cooler than it already was.

Loving the examples and graphics (still trying to decide if I'm "Team Eve" or "Team Malory"...)
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
The course makes it simple to understand the theory and practice of information technologies.

I am interested in working in the cyber security world and this course really help me take my forst steps towards that.

Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
Well explained, great lecturers. I wish they'll do more courses like that one.

It's a wonderful way to get and learn the complexity in the cyber world.
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
Excellent course! Fun, engaging and enlightening. I have not seen such a level of visual explanation in any MOOC before. The verbal explanations are also very precise and interesting
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
So far, this course has been very good! The teachers are great, and they teach applicable lessons in creative ways, exploring the field of information security.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
The content of videos is OK. There is nothing wrong. But there are many problems that show low quality. 1) For the most videos it would be sufficient to me just to read the transcript. But only a few videos (the first ones, that have no much value) have transcript in English. All other videos have transcript in Jewish, no transcript in English. 2) Many exercises have very low quality of problem definitions. Based on answers it is clear what the authors meant, but they could not formulate their thoughts clearly. 3) Some exercises have actually multiple correct answers, but the authors don't execute the code and don't check the result; instead, their just check if you guessed what they think the answer is.

Was this review helpful to you? Yes
Gilad K
Gilad is taking this course right now, spending 3 hours a week on it and found the course difficulty to be medium.
I enjoy this course very much. I find it very interesting, well designed, relevant, clear and thorough. Suitable for novices and advanced students alike, though it does assume you're equipped with some knowledge in the computer world. The subjects the course discusses are the central topics to get oriented in this field. It comes from the world renowned Tel Aviv University. I would recommend this to anyone looking to get acquainted or strengthen her/his acquaintance with information security, encryption, cyber security building blocks, central concepts and significant trends.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Information delivery and content in this course is very strong. Working through the exercises provides vastly enhanced insight, possibly doubling course learning. For those of us primarily involved with software product delivery, this information is well suited to connect all the threats and mitigation in the story-line, from low-level computing, through infrastructure, and finally global exposure on the web (part II). As an ancillary note, I felt like I learned a lot of information in this course that enhanced my general computing knowledge for tasks outside security.
Was this review helpful to you? Yes
Anonymous
Anonymous is taking this course right now.
bit trick and don't like the course at all, too mathematical and theoretical, i prefer to do another hands on than learn how the light was invented. In the world of constant evolution and changes we cannot lose many time learning theoretical content, we need to exercise more the concepts by osmosis. I not recommend this course for persons trying to find skills in computer security as this is very theoretical and tedious for some IT persons. It's more a scientific level of how the things were invented.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
I loved the clear explanations - just enough detail mixed with real-world examples. Very engaging! Appreciated the python "hackxercises" which helped be internalize the concepts and practice coding. The visuals augmented the material nicely to explain confusing cryptographic chains. I also liked the list of references for further study. I highly recommend the class for those interested in cyber security. Covered the primary concepts of cryptography, hashing and authentication.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Thank you for the course, it makes me aware of the different security risks in using the computes. As a user, I have more information on how to maintain my passwords, be wary of public WI-FI and how to secure my files.



The course is well presented. The videos are short enough not to cause information overload. The speakers are very clear and engaging.

I don't know Python so I was not able to programming exercises, but as a user, the course is very useful.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
The course is informative, and makes sure to clarify subjects while still going in to a reasonable amount of depth.

Material is presented with visual aids in the video's, to supplement the spoken explanations, and they do so in a way that is neither annoying nor distracting.

All in all I'd say that it's a good introduction in to Information Security, and I don't regret the time I've spent going through it.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Among all the online courses I have attended this course covered a lot of material in a sufficiently clear and visual way, which led to a better understanding of the issues a defender deals with every day. Further more it taught how to be cautious when choosing passwords and tips on remembering them. I personally find it useful for everyone in the Computer Science field.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Dear Staff,

I learned a lot of techniques from this course. Now that I am pursuing the Cyber ​​Security Master's degree, I notice that I have a huge lead on knowledge. It´s a pity that I was unable to take the final exam because I registered shortly before archiving, but I can pursue this course and Part II later on.

Todah rabbah!

Channah
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
I found this course enlightening. I think it is very important to know basic information security. The part about passwords, for example, is relevant for everyone. I didn't complete the coding exercises but still felt I learned all the important material. I especially liked the supplementary materials- there are some amazing things in there!
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Very high quality class. Help to understand complex problems in a very clear way. Videos are short, very clear and straight to the point. Relevant real world examples are provided for each security concept or attack. The supplementary material at the end of each chapter is very helpful to dig further.
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
Very clear explanation of the concepts giving the necessary background to go into depth in the second part.

A real eye opener for everyone new in this field to ensure they get the key concepts in order to be able to understand how security has to be approached with the correct mindset
Was this review helpful to you? Yes
Anonymous
Anonymous completed this course.
The course develops through the theory and practice of cryptography in an appealing methodology with great graphical explanations. Concise and clear undestanding of the material of this course will be the reason it scores high. Recommended!
Was this review helpful to you? Yes
  • 1

Class Central

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free