TAUx: Unlocking Information Security II: An Internet Perspective
Continue learning how systems are hacked and defended.

- Certification
- Certificate of completion
- Duration
- 7 weeks
- Price Value
- $ 149
- Difficulty Level
- Intermediate
Continue learning how systems are hacked and defended.
Unlocking Information Security: Part II is an intermediate-level computer science course offered by TAUx and IsraelX. This course is the second part of the Unlocking Information Security program and focuses on Internet security, cryptography, web vulnerabilities, and malware. It provides a comprehensive understanding of the digital threats we face in our increasingly connected world and equips students with the knowledge to combat these threats effectively.
This course is ideal for individuals interested in cybersecurity, computer science students, IT professionals, and anyone looking to enhance their understanding of digital security. It's particularly suited for those who have completed Part I of the Unlocking Information Security program and want to delve deeper into Internet and web security.
Explore more courses to enhance your cloud computing and Kubernetes skills.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
Want to know more about ethical hacking? Sign up for our free course and learn about ethical hacking and offensive security. The course is conveniently self-paced, and will also introduce you to the legal boundaries that distinguish “ethical” from “unethical” hacking, and the careers ethical hackers can pursue.
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.