TAUx: Unlocking Information Security I: From Cryptography to Buffer Overflows
Learn how systems are hacked and defended.

- Certification
- Certificate of completion
- Duration
- 5 weeks
- Price Value
- $ 148.99
- Difficulty Level
- Intermediate
Learn how systems are hacked and defended.
Welcome to "Unlocking Information Security: Part I," an engaging and comprehensive course designed to equip you with essential knowledge and skills in the rapidly evolving field of information security. In today's increasingly digitized world, understanding how to protect digital assets and combat cyber threats is more crucial than ever. This course, offered by TAUx and IsraelX, is the first part of the Unlocking Information Security program and provides a solid foundation in cybersecurity concepts, cryptography, and authentication methods.
The skills acquired in this course are highly valuable in today's digital landscape. Graduates can apply their knowledge to:
While a detailed syllabus is not provided, the course is structured to cover the following main topics:
This course, produced by Tel Aviv University and supported by Check Point, offers a unique blend of theoretical knowledge and practical insights. With its intermediate-level content and optional programming exercises, it provides an excellent opportunity for learners to dive deep into the world of information security and gain skills that are increasingly in demand across all sectors of the digital economy.
Explore more courses to enhance your cloud computing and Kubernetes skills.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.