Unlocking Information Security II: An Internet Perspective
About this Course
Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think and act, and how you can fight back. In this course, which is the second part of the Unlocking Information Security program, you will turn your attention to the Internet: you'll start by learning about the inherent vulnerabilities lurking in the multiple layers of the Internet's protocol stack and then meet the first line of internet defenses. Next, you'll take an in-depth look at the modern cryptographic concepts that are at the core of internet security and discover the mathematical miracle that makes them possible. With all this in mind, you will take a deep survey of the world wide web; understand the various technologies behind websites, how web servers and web browsers interact, how they can be attacked, and how they should be defended. Finally, you will learn about viruses, worms and trojans: what they are, how they spread, hide and attack, and the arms-race between them and the anti-virus industry. This course was produced at Tel Aviv University by TAU Online - learning innovation center.Created by: IsraelX,Tel Aviv University
Level: Intermediate
Related Online Courses
This course is one of the 5 courses of an introductory business information systems series, designed to introduce you to the amazing world of Information Technology. The series of courses is... more
This is CS50’s introduction to computer science for business professionals, designed for managers, product managers, founders, and decision-makers more generally. Whereas CS50 itself takes a b... more
Are you ready to take the first step from gamer to game designer? Then this course is for you! This course is an introduction to the basic concepts of game development and design theory, and... more
If you are a developer with experience working on any operating system and want to understand the basics of open source development, this course is for you. Experience with the command line is not... more
Proficient technologists working on the Industrial IoT vertical use lots of technologies and methods to control, manage and get information from the IoT devices. So, there are assembly lines and... more