Unlocking Information Security I: From Cryptography to Buffer Overflows
by EDX
★ 8.5/10
Learn how systems are hacked and defended. Free course from Tel Aviv University on cryptography, exploits, and buffer overflows.
Why this course
- Comprehensive coverage of core security concepts
- Real-world case study on Meltdown enhances relevance
- Free to audit with high-quality academic content
- Covers both theoretical and practical aspects of security
Read Full Review of This Course
Enroll Now on EDX