Latest Courses
ISTQB Artificial Intelligence Tester Sample ExamsCheck course
JAVA Programming Online Practice ExamCheck course
Programming for Kids and Beginners: Learn to Code in PythonCheck course
Practice Exams | Codeigniter 4 developer certificationCheck course
WordPress Practice Tests & Interview Questions (Basic/Adv)Check course
Git &Github Practice Tests & Interview Questions (Basic/Adv)Check course
Machine Learning and Deep Learning for Interviews & ResearchCheck course
Laravel | Build Pizza E-commerce WebsiteCheck course
101 - F5 CERTIFICATION EXAMCheck course
Master Python by Practicing 100 QuestionCheck course
ISTQB Artificial Intelligence Tester Sample ExamsCheck course
JAVA Programming Online Practice ExamCheck course
Programming for Kids and Beginners: Learn to Code in PythonCheck course
Practice Exams | Codeigniter 4 developer certificationCheck course
WordPress Practice Tests & Interview Questions (Basic/Adv)Check course
Unlocking Information Security: Part `

Unlocking Information Security: Part `

FREE

Add your review
Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare
9.1/10 (Our Score)
Product is rated as #4 in category Cyber Security

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real – so it is infinitely important to understand how hackers think and act, and how you can fight back. In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering. You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked. You will then combine everything you’ve learned and take a critical view of different authentication schemes: passwords, challenge–response systems and biometrics. Finally, you will learn about the most critical vulnerability of all times – …

Instructor Details

Prof. Avishai Wool is a faculty member of Tel Aviv university’s school of Electrical Engineering, and co-founder and CTO of AlgoSec, a global high-tech software company providing solutions for business-driven security management in the field of network security policy management. He began his career in the IDF’s Unit 8200, also known as "The Secret Startup Machine”. Many entrepreneurs and founders of leading startups served in this unit.

Specification: Unlocking Information Security: Part `

Duration

30 hours

Year

2020

Level

Intermediate

Certificate

Yes

Quizzes

Yes

18 reviews for Unlocking Information Security: Part `

4.3 out of 5
16
1
0
1
0
Write a review
Show all Most Helpful Highest Rating Lowest Rating
  1. Anonymous

    Excellent course! Fun, engaging and enlightening. I have not seen such a level of visual explanation in any MOOC before. The verbal explanations are also very precise and interesting

    Helpful(0) Unhelpful(0)You have already voted this
  2. Anonymous

    The moment the thought of cyber security came to my mind it was Israel that occupied my mind.Consequently I decided to take this course by TAU at EdX.The lucid explanation and effective teaching style of both the educators are worth mentioning.I was deeply impressed by the manner of teaching.Hope the journey continues.

    Helpful(0) Unhelpful(0)You have already voted this
  3. Anonymous

    So far, this course has been very good! The teachers are great, and they teach applicable lessons in creative ways, exploring the field of information security.

    Helpful(0) Unhelpful(0)You have already voted this
  4. Anonymous

    This course is amazing! First of all the content is great, clear and profound, making complicated issues accessible and understandable. Furthermore, the lecturers are great, they are real experts and yet they seem approachable. The effort and thought that were put into this course really make it stand out, the explanations, the animations, I took many online courses before and none of them was as good as this one.

    Helpful(0) Unhelpful(0)You have already voted this
  5. Gilad K

    I enjoy this course very much. I find it very interesting, well designed, relevant, clear and thorough. Suitable for novices and advanced students alike, though it does assume you’re equipped with some knowledge in the computer world. The subjects the course discusses are the central topics to get oriented in this field. It comes from the world renowned Tel Aviv University. I would recommend this to anyone looking to get acquainted or strengthen her/his acquaintance with information security, encryption, cyber security building blocks, central concepts and significant trends.

    Helpful(0) Unhelpful(0)You have already voted this
  6. Anonymous

    Information delivery and content in this course is very strong. Working through the exercises provides vastly enhanced insight, possibly doubling course learning. For those of us primarily involved with software product delivery, this information is well suited to connect all the threats and mitigation in the story line, from low level computing, through infrastructure, and finally global exposure on the web (part II). As an ancillary note, I felt like I learned a lot of information in this course that enhanced my general computing knowledge for tasks outside security.

    Helpful(0) Unhelpful(0)You have already voted this
  7. Anonymous

    I found this course enlightening. I think it is very important to know basic information security. The part about passwords, for example, is relevant for everyone. I didn’t complete the coding exercises but still felt I learned all the important material. I especially liked the supplementary materials there are some amazing things in there!

    Helpful(0) Unhelpful(0)You have already voted this
  8. Anonymous

    Very useful and simple to understand course. It gives the basic information about security techniques in general. It was highly interesting as well. Thanks for creators for excellent lessons!

    Helpful(0) Unhelpful(0)You have already voted this
  9. Anonymous

    Thank you for the course, it makes me aware of the different security risks in using the computes. As a user, I have more information on how to maintain my passwords, be wary of public WI FI and how to secure my files.

    The course is well presented. The videos are short enough not to cause information overload. The speakers are very clear and engaging.

    I don’t know Python so I was not able to programming exercises, but as a user, the course is very useful.

    Helpful(0) Unhelpful(0)You have already voted this
  10. Anonymous

    Very clear explanation of the concepts giving the necessary background to go into depth in the second part.

    A real eye opener for everyone new in this field to ensure they get the key concepts in order to be able to understand how security has to be approached with the correct mindset

    Helpful(0) Unhelpful(0)You have already voted this
  11. Anonymous

    The course develops through the theory and practice of cryptography in an appealing methodology with great graphical explanations. Concise and clear undestanding of the material of this course will be the reason it scores high. Recommended!

    Helpful(0) Unhelpful(0)You have already voted this
  12. Anonymous

    Very high quality class. Help to understand complex problems in a very clear way. Videos are short, very clear and straight to the point. Relevant real world examples are provided for each security concept or attack. The supplementary material at the end of each chapter is very helpful to dig further.

    Helpful(0) Unhelpful(0)You have already voted this
  13. Anonymous

    Dear Staff,

    I learned a lot of techniques from this course. Now that I am pursuing the Cyber Security Master’s degree, I notice that I have a huge lead on knowledge. It’s a pity that I was unable to take the final exam because I registered shortly before archiving, but I can pursue this course and Part II later on.

    Todah rabbah!

    Channah

    Helpful(0) Unhelpful(0)You have already voted this
  14. Anonymous

    bit trick and don’t like the course at all, too mathematical and theoretical, i prefer to do another hands on than learn how the light was invented. In the world of constant evolution and changes we cannot lose many time learning theoretical content, we need to exercise more the concepts by osmosis. I not recommend this course for persons trying to find skills in computer security as this is very theoretical and tedious for some IT persons. It’s more a scientific level of how the things were invented.

    Helpful(0) Unhelpful(0)You have already voted this
  15. Anonymous

    I loved the clear explanations just enough detail mixed with real world examples. Very engaging! Appreciated the python “hackxercises” which helped be internalize the concepts and practice coding. The visuals augmented the material nicely to explain confusing cryptographic chains. I also liked the list of references for further study. I highly recommend the class for those interested in cyber security. Covered the primary concepts of cryptography, hashing and authentication.

    Helpful(0) Unhelpful(0)You have already voted this
  16. Anonymous

    Great presentation. Clear lectures. Loved the graphical elements used to illustrate the coursework. I would love to see more courses from these guys.

    Helpful(0) Unhelpful(0)You have already voted this
  17. Anonymous

    Among all the online courses I have attended this course covered a lot of material in a sufficiently clear and visual way, which led to a better understanding of the issues a defender deals with every day. Further more it taught how to be cautious when choosing passwords and tips on remembering them. I personally find it useful for everyone in the Computer Science field.

    Helpful(0) Unhelpful(0)You have already voted this
  18. Anonymous

    Very complete, interesting and well done course.

    I will suggest will everyone interested in cyber security.

    I really appreciate the cryptographic section. It simple explain hard concepts.

    Helpful(0) Unhelpful(0)You have already voted this

    Add a review

    Your email address will not be published. Required fields are marked *

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Price tracking

    Java Code Geeks
    Logo
    Register New Account
    Compare items
    • Total (0)
    Compare