Unlocking Information Security: Part Ⅰ
Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown). An overview of cryptography with an emphasis on symmetric ciphers. A high-level examination of hash functions and an overview of common hash algorithms. A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
Avishai Wool|Dan Gittik|