Latest Courses
Create your first API with ASP.NET CoreCheck course
R Programming for Beginners: Includes R Mini-Project!Check course
Node, Express, React JS & MySQL full stack web developmentCheck course
Apache Cassandra for Data EngineersCheck course
One page Portfolio template with sliding sectionsCheck course
PHP | Create a Cryptocurrency Website From ScratchCheck course
Build A TodoList with Java, Spring Boot and VueCheck course
Elementor Custom CSS Masterclass For BeginnersCheck course
Salesforce CPQ Complete MasterclassCheck course
AWS Identity and Access Management (IAM) FoundationsCheck course
Create your first API with ASP.NET CoreCheck course
R Programming for Beginners: Includes R Mini-Project!Check course
Node, Express, React JS & MySQL full stack web developmentCheck course
Apache Cassandra for Data EngineersCheck course
One page Portfolio template with sliding sectionsCheck course
Unlocking Information Security: Part ``

Unlocking Information Security: Part “

FREE

Add your review
Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare
8.7/10 (Our Score)
Product is rated as #10 in category Cyber Security

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real – so it’s infinitely important to understand how hackers think and act, and how you can fight back. In this course, which is the second part of the Unlocking Information Security program, you will turn your attention to the Internet: you’ll start by learning about the inherent vulnerabilities lurking in the multiple layers of the Internet’s protocol stack and then meet the first line of internet defenses. Next, you’ll take an in–depth look at the modern cryptographic concepts that are at the core of internet security and discover the mathematical miracle that makes them possible. With all this in mind, you will take a deep survey of the world wide web; understand the various technologies behind websites, how web servers and web browsers interact, how they can be attacked, and how they should be defended. Finally, you will learn about viruses, worms and trojans: what they are, how they spread, hide and attack, and the arms–race between them and the anti–virus industry. This course was produced at Tel Aviv University by …

Instructor Details

Prof. Avishai Wool is a faculty member of Tel Aviv university’s school of Electrical Engineering, and co-founder and CTO of AlgoSec, a global high-tech software company providing solutions for business-driven security management in the field of network security policy management. He began his career in the IDF’s Unit 8200, also known as "The Secret Startup Machine”. Many entrepreneurs and founders of leading startups served in this unit.

Specification: Unlocking Information Security: Part “

Duration

30 hours

Year

2020

Level

Intermediate

Certificate

Yes

Quizzes

No

6 reviews for Unlocking Information Security: Part “

4.9 out of 5
5
0
0
0
1
Write a review
Show all Most Helpful Highest Rating Lowest Rating
  1. Anonymous

    The course is a fast paced comprehensive coverage of the field of cryptography. It has helped me to understand various concepts involved and has started me on the way to learning Python. I have taken this course under Audit Track and would have taken it via the verified track in case the fee was lower say around 30 to 40 USD. The combination of experience(bald head like mine) and the youthful energy of the instructors is a great combination. Alas the final touch about the endless chapters of this game between attackers and defenders somehow reminds me of the great game played between Russian and British Empires around Pamirs.

    Helpful(0) Unhelpful(0)You have already voted this
  2. Anonymous

    Very useful and simple to understand course. It gives the information about security techniques, networks and viruses, cryptography etc. It was highly interesting as well. Thanks for excellent lessons!

    Helpful(0) Unhelpful(0)You have already voted this
  3. Anonymous

    Thank you for the course. The course gives a simple explanation of the malwares affecting the computers and different risks involved in using the internet. As a user, I now more aware the on how to protect my computer and information.

    Helpful(0) Unhelpful(0)You have already voted this
  4. Anonymous

    Great bit(e) size overview of the more in depth concepts you need to know in order to understand cyber security. Real structured overview of these concepts together with some practical implementation and a real good set of samples to make the point and explain what it (can) mean(s) in practice.

    If there is a next third course on this topic, I’m definitely in!

    Helpful(0) Unhelpful(0)You have already voted this
  5. Anonymous

    Very high quality class. Help to understand complex problems in a very clear way. Videos are short, very clear and straight to the point. Relevant real world examples are provided for each security concept or attack. The supplementary material at the end of each chapter is very helpful to dig further.

    Helpful(0) Unhelpful(0)You have already voted this
  6. Anonymous

    bit trick and don’t like the course at all, too mathematical and theoretical, i prefer to do another hands on than learn how the light was invented. In the world of constant evolution and changes we cannot lose many time learning theoretical content, we need to exercise more the concepts by osmosis. I not recommend this course for persons trying to find skills in computer security as this is very theoretical and tedious for some IT persons. It’s more a scientific level of how the things were invented.

    Helpful(0) Unhelpful(0)You have already voted this

    Add a review

    Your email address will not be published.

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Unlocking Information Security: Part “
    Unlocking Information Security: Part “

    Price tracking

    Java Code Geeks
    Logo
    Register New Account
    Reset Password
    Compare items
    • Total (0)
    Compare