Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Best of All-Time Online Course

Unlocking Information Security I: From Cryptography to Buffer Overflows

Tel Aviv University via edX

Overview

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.

You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked.

You will then combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics. Finally, you will learn about the most critical vulnerability of all times - Buffer Overflow.

This course was produced at Tel Aviv University by TAU Online - learning innovation center.

Taught by

Avishai Wool and Dan Gittik

Related Courses

Reviews

4.8 rating, based on 174 reviews

Start your review of Unlocking Information Security I: From Cryptography to Buffer Overflows

  • Anonymous

    Anonymous is taking this course right now.

    This course is amazing! First of all - the content is great, clear and profound, making complicated issues accessible and understandable. Furthermore, the lecturers are great, they are real experts and yet they seem approachable. The effort and thought that were put into this course really make it stand out, the explanations, the animations, I took many online courses before and none of them was as good as this one.
  • Anonymous

    Anonymous is taking this course right now.

    The moment the thought of cyber security came to my mind it was Israel that occupied my mind.Consequently I decided to take this course by TAU at EdX.The lucid explanation and effective teaching style of both the educators are worth mentioning.I was deeply impressed by the manner of teaching.Hope the journey continues.
  • Profile image for Tomgi859
    Tomgi859
    One of the mose awesome, friendly, understandable, and definitely the one with the most efforts invested in I've even ran into in my life! Super-friendly course, which require familarity with Python, which I had not a all in the beginning, but with JAVA,...
  • Anonymous

    Anonymous completed this course.

    Most amazing course I have taken. Though it does not teach actual hacking at professional level , it teaches about all the attacks which can be made by hackers and how to defend against them. You should also take it on https://www.edx.org/course/unlocking-information-security-part-i.
  • Anonymous

    Anonymous is taking this course right now.

    Thank you Prof. Avishai Wool and Dan Gitik for an AWESOME course!
    Information Security just got a whole lot cooler than it already was.
    Loving the examples and graphics (still trying to decide if I'm "Team Eve" or "Team Malory"...)
  • Anonymous

    Anonymous is taking this course right now.

    The course makes it simple to understand the theory and practice of information technologies.
    I am interested in working in the cyber security world and this course really help me take my forst steps towards that.
  • Anonymous

    Anonymous completed this course.

    talks in general about a lot of internet security issues for a user includes some coding in python to get a feeling of the encryption and its vulnerabilities
  • Anonymous

    Anonymous is taking this course right now.

    Well explained, great lecturers. I wish they'll do more courses like that one.
    It's a wonderful way to get and learn the complexity in the cyber world.
  • Anonymous

    Anonymous is taking this course right now.

    Excellent course! Fun, engaging and enlightening. I have not seen such a level of visual explanation in any MOOC before. The verbal explanations are also very precise and interesting
  • Anonymous

    Anonymous is taking this course right now.

    So far, this course has been very good! The teachers are great, and they teach applicable lessons in creative ways, exploring the field of information security.
  • Anonymous
    It was amazing to discover this great course it helped me start my own journey in Cybersecurity and discover more.

    I encourage you to do so and join this course
  • Anonymous

    Anonymous completed this course.

    Wow brilliant technology you bring us actually attacking And defending systems in the real world not just theoretical stuff
    Thank you very much
    Yehuda m
  • Anonymous

    Anonymous completed this course.

    Very good course. This is a must for starters.
    All the concepts have been greatly explained in detail with a lot of visualization.
  • Anonymous

    Anonymous completed this course.

    Awesome course! Really great! Avishai and Dan are really super skilled and very nice guys and their explanations are always very clear! The course is not that easy, it requires and intermediate knowledge of computer systems and some skills in maths and...
  • Profile image for Dodoytis
    Dodoytis

    Dodoytis completed this course, spending 10 hours a week on it and found the course difficulty to be medium.

    Awesome course! Really great! Avishai and Dan are really super skilled and very nice guys and their explanations are always very clear! The course is not that easy, it requires and intermediate knowledge of computer systems and some skills in maths and...
  • Anonymous

    Anonymous is taking this course right now.

    I do not have coding experience, i am kind of computer illiterate. I really appreciated taking this course because I am learning about safety in the digital world, which is a necessity nowadays. I wish more people will have access to this course, like...
  • Anonymous

    Anonymous completed this course.

    The content of videos is OK. There is nothing wrong. But there are many problems that show low quality. 1) For the most videos it would be sufficient to me just to read the transcript. But only a few videos (the first ones, that have no much value) have transcript in English. All other videos have transcript in Jewish, no transcript in English. 2) Many exercises have very low quality of problem definitions. Based on answers it is clear what the authors meant, but they could not formulate their thoughts clearly. 3) Some exercises have actually multiple correct answers, but the authors don't execute the code and don't check the result; instead, their just check if you guessed what they think the answer is.
  • Anonymous

    Anonymous completed this course.

    I enjoyed every single part of the course until the final exam. There were questions that were truly unfamiliar to the context within the course, and I disliked that a lot. I barely pass even though I have taken notes, pay a lot of attention, went through the supplementary material... and to be honest, I'd be really upset if I didn't got a passing grade, considering the time I invested in this course.
    Now I'm up to the second part, and I hope that the final exam will not be something like that: made for people with knowledge beyond what is seen in class.

    Now, if you don't have any interest in the certificate, this course is perfect for you. Focusing on it, it excells at that.
  • Anonymous
    Amazing! Splendid curriculum! The keynotes were absolutely brilliant with hot topics.Amazing! Splendid curriculum! The keynotes were absolutely brilliant with hot topics.Amazing! Splendid curriculum! The keynotes were absolutely brilliant with hot topics.Amazing! Splendid curriculum! The keynotes were absolutely brilliant with hot topics.Amazing! Splendid curriculum! The keynotes were absolutely brilliant with hot topics.Amazing! Splendid curriculum! The keynotes were absolutely brilliant with hot topics.Amazing! Splendid curriculum! The keynotes were absolutely brilliant with hot topics.Amazing! Splendid curriculum! The keynotes were absolutely brilliant with hot topics.
  • Anonymous

    Anonymous completed this course.

    Dear,
    the course was very synthetic and nontheless very understandable.
    I've learned much of the content at my cs engineer school long time ago and while working in software engineering for a great French bank, and that course help me to recollect everything and to give some perspective. And also to get some topic to go and explore more deeply.
    Now working for a French static code analyser vendor (including SAST to some extent), I wanted to add security to my skills (and starting with your courses was a good descision to me) and to continue with more deep dive courses and specification (after finishing Part II of course)
    Thanks.

Class Central

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free