Warning: WP Redis: Connection refused in /www/wwwroot/cmooc.com/wp-content/plugins/powered-cache/includes/dropins/redis-object-cache.php on line 1433
解锁信息安全 2 | MOOC中国 - 慕课改变你,你改变世界

解锁信息安全 2

Unlocking Information Security: Part ⅠⅠ

Continue learning how systems are hacked and defended.

1312 次查看
以色列国家高等教育机构联合会
edX
  • 完成时间大约为 7
  • 中级
  • 英语, 其他
注:因开课平台的各种因素变化,以上开课日期仅供参考

你将学到什么

An overview of the most critical vulnerability of all times - buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP

An introduction to the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and useful defenses against them like NAT Boxes and Firewalls

An in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital Signatures and MAC

A survey of the world wide web's security concerns (SQL Injections, CSRF, and XSS): is the Internet ultimately vulnerable or is there a silver lining?

An introduction to the world of malware: viruses, worms, Trojans and more - computer viruses and how to beat them

课程概况

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real – so it’s infinitely important to understand how hackers think and act, and how you can fight back.

In this course, which is the second part of the Unlocking Information Security program, you will learn about the most critical vulnerability of all times – the buffer overflow. Then, you will turn your attention to the Internet: you’ll start by learning about the inherent vulnerabilities lurking in the multiple layers of the Internet’s protocol stack and then meet the first line of internet defenses. Next, you’ll take an in-depth look at the modern cryptographic concepts that are at the core of internet security and discover the mathematical miracle that makes them possible.

With all this in mind, you will take a deep survey of the world wide web; understand the various technologies behind websites, how web servers and web browsers interact, how they can be attacked, and how they should be defended. Finally, you will learn about viruses, worms and trojans: what they are, how they spread, hide and attack, and the arms-race between them and the anti-virus industry.

This course was produced at Tel Aviv University by TAU Online – learning innovation center.

预备知识

Complete the first part of the course - Unlocking Information Security: Part Ⅰ.

The course includes optional programming exercises that require familiarity with the Python programming language. While the course can be completed with great benefit without solving them, we highly recommend you give them a try.

The course also assumes some mathematical maturity, including algebra, basic combinatorics, and probability.

千万首歌曲。全无广告干扰。
此外,您还能在所有设备上欣赏您的整个音乐资料库。免费畅听 3 个月,之后每月只需 ¥10.00。
Apple 广告
声明:MOOC中国十分重视知识产权问题,我们发布之课程均源自下列机构,版权均归其所有,本站仅作报道收录并尊重其著作权益。感谢他们对MOOC事业做出的贡献!
  • Coursera
  • edX
  • OpenLearning
  • FutureLearn
  • iversity
  • Udacity
  • NovoEd
  • Canvas
  • Open2Study
  • Google
  • ewant
  • FUN
  • IOC-Athlete-MOOC
  • World-Science-U
  • Codecademy
  • CourseSites
  • opencourseworld
  • ShareCourse
  • gacco
  • MiriadaX
  • JANUX
  • openhpi
  • Stanford-Open-Edx
  • 网易云课堂
  • 中国大学MOOC
  • 学堂在线
  • 顶你学堂
  • 华文慕课
  • 好大学在线CnMooc
  • (部分课程由Coursera、Udemy、Linkshare共同提供)

© 2008-2022 CMOOC.COM 慕课改变你,你改变世界