للحصول على شهادة
This Security@Cambridge cybersecurity course provides a deep and practical understanding of how computer systems are attacked and defended. It focuses on building a strong security mindset by thinking like an attacker and understanding system vulnerabilities.
The course begins with the concept of adversarial thinking, which teaches how security professionals analyze systems from an attacker's perspective. It then explores access control in Unix systems, explaining how permissions and file security work.
You will learn about privilege escalation, showing how insecure programs can allow attackers to gain higher system access. The course also covers buffer overflow vulnerabilities, one of the most important topics in system security, and explains how attackers can take control of a computer through memory manipulation.
In addition, it includes practical demonstrations of binary file handling using C and Python, helping learners understand low-level system behavior. It also covers real exploitation techniques, including buffer overflow attacks and bypassing security protections like NX.
Other important topics include SQL injection, password security, hashing, rainbow tables, and why passwords are still widely used despite their weaknesses.
By the end of this course, learners will understand core cybersecurity vulnerabilities, exploitation techniques, and defensive strategies used to protect modern systems.