Unlocking Information Security II: An Internet Perspective


Save for laterSavedDeleted 0

👤 Join WhatsApp Learners
Deal Score+1

Continue learning how systems are hacked and defended.

Join Email Learners

Follow the guide on landing page

Information Security is everywhere: as the world becomes more and more digitized, it becomes more and more hackable. Cyberattacks, data breaches, and even cyber warfare are all very real – so it’s infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the second part of the Unlocking Information Security program, you will turn your attention to the Internet: you’ll start by learning about the inherent vulnerabilities lurking in the multiple layers of the Internet’s protocol stack and then meet the first line of internet defenses. Next, you’ll take an in-depth look at the modern cryptographic concepts that are at the core of internet security and discover the mathematical miracle that makes them possible.

With all this in mind, you will take a deep survey of the world wide web; understand the various technologies behind websites, how web servers and web browsers interact, how they can be attacked, and how they should be defended. Finally, you will learn about viruses, worms, and trojans: what they are, how they spread, hide and attack, and the arms race between them and the anti-virus industry.

This course was produced at Tel Aviv University by TAU Online – learning innovation center.

  • An introduction to the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and useful defenses against them like NAT Boxes and Firewalls
  • An in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital Signatures, and MAC
  • A survey of the world wide web’s security concerns (SQL Injections, CSRF, and XSS): is the Internet ultimately vulnerable or is there a silver lining?
  • An introduction to the world of malware: viruses, worms, Trojans, and more – computer viruses and how to beat them
Unlocking Information Security II: An Internet Perspective

Originally posted 2022-02-10 05:49:58.

1


PREMIUM COURSE: Learn The Ultimate WhatsApp Lead Generation Blueprint: How to get customers with Facebook Ads (CLICK HERE TO LEARN MORE!)



DISCLAIMER: Courses on Future Syllabus are free but subject to return to their original prices on host platforms upon coupon expiration. Enrol while they are free.




Silas Bamigbola

Certified Computer Engineer & Author, 'Lost Boys'. I believe in the influence of right information. Join me on Twitter.

Stay active

Leave a Reply

error: Content is protected !!
Future Syllabus
Logo
Enable registration in settings - general