top of page

WHO

WE ARE

Unlocking Information Security I: From Cryptography to Buffer Overflows

Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).

An overview of cryptography with an emphasis on symmetric ciphers.

A high-level examination of hash functions and an overview of common hash algorithms.

Unlocking Information Security II: An Internet Perspective

An introduction to the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and useful defenses against them like NAT Boxes and Firewalls

An in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA

bottom of page