Unlocking Information Security

Go to class
Write Review

Unlocking Information Security provided by edX is a comprehensive online course, which lasts for 12 weeks long, 4-6 hours a week. Unlocking Information Security is taught by Avishai Wool and Dan Gittik. Upon completion of the course, you can receive an e-certificate from edX. The course is taught in Englishand is $298.00. Visit the course page at edX for detailed price information.

Overview
  • Nominated for the 2020 edX Prize

    Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think and act, and how we can fight back.

    Needless to say, the demand for professionals that are knowledgeable in information security is exploding, and careers in the field are amongst the highest paying in the industry. Even so, it's a challenging skill to master - information security is a battle of wits between attackers and defenders, so you really do have to learn from the best.

    Israel is well known as a leader in the field, and "Unlocking Information Security" endorsed by Check Point Ltd., is the first Israeli academic MOOC covering the topic. From their work in the academia, industry and Israeli intelligence corps, the instructors of the course possess an extensive experience in the field.

    Completing this program will teach you the necessary knowledge and skills needed to become a better and more vigilant professional in the high-tech industry. You will learn about the different ways in which computer systems can be vulnerable, as well as many useful mitigation techniques, including the most important cryptographic tools; you will take a hard look “under the hood” of operating systems and the Internet, understand how they can be exploited and how they can be secured; and most importantly, you will understand the principles of secure computer systems and the mindsets of both attackers and defenders.

Syllabus
  • Courses under this program:
    Course 1: Unlocking Information Security I: From Cryptography to Buffer Overflows

    Learn how systems are hacked and defended.



    Course 2: Unlocking Information Security II: An Internet Perspective

    Continue learning how systems are hacked and defended.