TAUx: Unlocking Information Security II: An Internet Perspective

TAUx: Unlocking Information Security II: An Internet Perspective

by Tel Aviv University

Unlocking Information Security: Part II

Course Description

Unlocking Information Security: Part II is an intermediate-level computer science course offered by TAUx and IsraelX. This course is the second part of the Unlocking Information Security program and focuses on Internet security, cryptography, web vulnerabilities, and malware. It provides a comprehensive understanding of the digital threats we face in our increasingly connected world and equips students with the knowledge to combat these threats effectively.

What Students Will Learn

  • Understanding of Internet protocol stack vulnerabilities and defenses
  • In-depth knowledge of cryptographic concepts and techniques
  • Awareness of web security concerns and potential solutions
  • Introduction to various types of malware and anti-virus strategies

Pre-requisites

  • Completion of Unlocking Information Security: Part I
  • Familiarity with Python programming language (for optional exercises)
  • Basic mathematical knowledge, including algebra, combinatorics, and probability

Course Content

  • Internet protocol stack vulnerabilities (IP Spoofing, TCP Injections, DDoS)
  • Internet defenses (NAT Boxes, Firewalls)
  • Cryptographic concepts and techniques (Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital Signatures, MAC)
  • World Wide Web security concerns (SQL Injections, CSRF, XSS)
  • Malware types (viruses, worms, Trojans)
  • Anti-virus strategies and the ongoing arms race in cybersecurity

Who This Course Is For

This course is ideal for individuals interested in cybersecurity, computer science students, IT professionals, and anyone looking to enhance their understanding of digital security. It's particularly suited for those who have completed Part I of the Unlocking Information Security program and want to delve deeper into Internet and web security.

Real-World Applications

  • Identify and mitigate potential security threats in network systems
  • Implement robust cryptographic solutions for secure communication
  • Enhance web application security and prevent common vulnerabilities
  • Recognize and defend against various types of malware
  • Contribute to cybersecurity efforts in their organizations or pursue careers in information security

Syllabus Overview

  1. Introduction to Internet protocol stack vulnerabilities
  2. Internet defenses (NAT Boxes and Firewalls)
  3. Cryptographic concepts and techniques
  4. World Wide Web security
  5. Introduction to malware
  6. Anti-virus strategies and the cybersecurity arms race
Similar Courses
Course Page   TAUx: Unlocking Information Security II: An Internet Perspective