Unlocking Information Security I: From Cryptography to Buffer Overflows

Learn how systems are hacked and defended. Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it is infinitely important to understand how hackers think and act, and how you can fight back. In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will explore different types of vulnerabilities through famous examples of design flaws, implementation bugs and social engineering.

Course syllabus:

  1. Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study

  2. An overview of cryptography with an emphasis on symmetric ciphers

  3. A high-level examination of hash functions and an overview of common hash algorithms

  4. A critical look at different authentication schemes, including passwords, challenge-response, and biometrics

  5. An overview of the most critical vulnerability of all times - buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP