top of page


WHO
WE ARE


Unlocking Information Security I: From Cryptography to Buffer Overflows
Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
An overview of cryptography with an emphasis on symmetric ciphers.
A high-level examination of hash functions and an overview of common hash algorithms.
Unlocking Information Security II: An Internet Perspective
An introduction to the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and useful defenses against them like NAT Boxes and Firewalls
An in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA

bottom of page