RiseUpp Logo
Educator Logo

Information Security Fundamentals

Master essential cybersecurity concepts from cryptography to buffer overflows in this comprehensive course on protecting digital systems.

Master essential cybersecurity concepts from cryptography to buffer overflows in this comprehensive course on protecting digital systems.

This intermediate-level course provides a thorough introduction to information security fundamentals, focusing on both defensive and offensive aspects. Students explore various security vulnerabilities, cryptographic principles, and authentication methods. The course covers critical topics including symmetric ciphers, hash functions, and buffer overflow attacks, using real-world case studies like Meltdown. Through a combination of theoretical concepts and optional Python programming exercises, participants gain practical understanding of how systems are hacked and defended, preparing them for the evolving challenges of cybersecurity.

5

English

Arabic, English, Hebrew

Powered by

Provider Logo
Information Security Fundamentals

This course includes

5 Weeks

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

12,300

Audit For Free

What you'll learn

  • Master information security terminology and core concepts

  • Understand cryptographic principles and symmetric ciphers

  • Analyze different types of system vulnerabilities and exploits

  • Implement and evaluate various authentication schemes

  • Explore hash functions and their applications in security

  • Understand buffer overflow attacks and mitigation techniques

Skills you'll gain

Information Security
Cryptography
Buffer Overflow
Authentication Systems
Hash Functions
Cyber Attacks
Vulnerability Assessment
System Defense

This course includes:

PreRecorded video

Graded assignments, exams

Access on Mobile, Tablet, Desktop

Limited Access access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Created by

Provided by

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

Module Description

This comprehensive course covers fundamental concepts in information security, focusing on both theoretical understanding and practical applications. The curriculum includes detailed exploration of cryptography, from historical ciphers to modern encryption methods, vulnerability analysis through real-world case studies, and critical security concepts like hash functions and authentication systems. Students learn about various attack vectors, defense mechanisms, and the principles of secure system design. The course emphasizes hands-on learning through programming exercises and practical examples, preparing participants to understand and address real-world security challenges.

Fee Structure

Instructors

Avishai Wool
Avishai Wool

4 Courses

Cybersecurity Expert and Tech Entrepreneur

Prof. Avishai Wool is a distinguished faculty member at Tel Aviv University's School of Electrical Engineering and co-founder and CTO of AlgoSec, a leading software company specializing in network security policy management. His career began in the IDF's prestigious Unit 8200, which has become known as "The Secret Startup Machine" due to its role in producing numerous successful tech entrepreneurs. His expertise spans both academic research and practical application in cybersecurity, demonstrated through his leadership at AlgoSec, where he has helped develop cutting-edge security management solutions, while simultaneously contributing to academic research and education in electrical engineering. His work represents the successful integration of military intelligence experience, academic expertise, and entrepreneurial innovation in cybersecurity, contributing significantly to Israel's position as a global leader in tech innovation.

Dan Gittik
Dan Gittik

4 Courses

Cybersecurity Education Expert

Dan Gittik is a distinguished lecturer in Information Security at Tel Aviv University, bringing diverse experience from both military and corporate sectors. His career path includes serving as a tech lead and corporate innovator at the Ministry of Defense's cyber division for five years, followed by roles at prominent tech companies including Google London's Android Framework team and Magic Leap's AI division. His expertise spans information security, Python programming, and artificial intelligence, making him a versatile technology expert. As a lecturer, he combines his practical experience from military service, industry, and academia to deliver comprehensive instruction in cybersecurity. His teaching approach often incorporates advanced programming concepts, including tracing, metaprogramming, and bytecode manipulation, particularly in Python. His diverse background across multiple sectors enables him to bring real-world applications and practical insights to his academic instruction.

Information Security Fundamentals

This course includes

5 Weeks

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

12,300

Audit For Free

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

5 course rating

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.