University of Maryland Classifieds>University of Maryland Online Courses>Unlocking Information Security I: From Cryptography to Buffer Overflows

Unlocking Information Security I: From Cryptography to Buffer Overflows

About this Course

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back. In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering. You will then move on to discover the art of cryptography, from ancient times to the modern era, and learn about famous ciphers, how they can be cracked, and what can be done to thwart such attacks. Next, you will learn about an important aspect of cryptography that involves no secrets at all: hash functions. You will understand what they are, how they can be used, and how they can be attacked. You will then combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics. Finally, you will learn about the most critical vulnerability of all times - Buffer Overflow. This course was produced at Tel Aviv University by TAU Online - learning innovation center.

Created by: IsraelX,Tel Aviv University

Level: Intermediate


Related Online Courses

La ciencia de datos es un área enfocada en la extracción de conocimiento a partir de conjuntos de datos con diversas fuentes y formas. El conocimiento adquirido es generado por diversas técnicas de... more
UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System... more
Code and run your first Python program in minutes without installing anything! **** This course is designed for learners with no coding experience, providing a solid foundation of not just Python,... more
Want to take a fascinating journey through the history of gaming? Then this course is for you. Our journey begins with an exploration of how ancient board games evolved into modern board games and... more
Proficient technologists working on the Industrial IoT vertical use lots of technologies and methods to control, manage and get information from the IoT devices. So, there are assembly lines and... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL