Home Cybersecurity Courses Unlocking Information Security I: From Cryptography to Buffer Overflows
Unlocking Information Security I: From Cryptography to Buffer Overflows

Unlocking Information Security I: From Cryptography to Buffer Overflows

by EDX
★ 8.5/10

Learn how systems are hacked and defended. Free course from Tel Aviv University on cryptography, exploits, and buffer overflows.

Why this course

  • Comprehensive coverage of core security concepts
  • Real-world case study on Meltdown enhances relevance
  • Free to audit with high-quality academic content
  • Covers both theoretical and practical aspects of security
Read Full Review of This Course Enroll Now on EDX

Related Courses

Foundations of Cybersecurity Course
Foundations of Cybersecurity Course
Coursera
★ 10/10
Cybersecurity Assessment: CompTIA Security+ & CYSA+ Course
Cybersecurity Assessment: CompTIA Security+ & CYSA+ Course
Coursera
★ 9.8/10
IBM and ISC2 Cybersecurity Specialist Professional Certificate Course
IBM and ISC2 Cybersecurity Specialist Professional Certificate Course
Coursera
★ 9.8/10
Critical Concepts in Incident Response Frameworks Course
Critical Concepts in Incident Response Frameworks Course
Udemy
★ 9.8/10