Rutgers Classifieds>Rutgers Online Courses>Unlocking Information Security II: An Internet Perspective

Unlocking Information Security II: An Internet Perspective

About this Course

Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think and act, and how you can fight back. In this course, which is the second part of the Unlocking Information Security program, you will turn your attention to the Internet: you'll start by learning about the inherent vulnerabilities lurking in the multiple layers of the Internet's protocol stack and then meet the first line of internet defenses. Next, you'll take an in-depth look at the modern cryptographic concepts that are at the core of internet security and discover the mathematical miracle that makes them possible. With all this in mind, you will take a deep survey of the world wide web; understand the various technologies behind websites, how web servers and web browsers interact, how they can be attacked, and how they should be defended. Finally, you will learn about viruses, worms and trojans: what they are, how they spread, hide and attack, and the arms-race between them and the anti-virus industry. This course was produced at Tel Aviv University by TAU Online - learning innovation center.

Created by: IsraelX,Tel Aviv University

Level: Intermediate


Related Online Courses

Information technology (IT) can be viewed as a system, a combination of independent parts all working together to accomplish a certain goal. Systems are everywhere. For example, the respiratory,... more
Code and run your first Java program in minutes without installing anything! This course is designed for learners with limited coding experience, providing a solid foundation of not just Java, but... more
This course introduces the concept of a designer working for themselves and creating their own design-driven brand. It requires learners to apply ideas to a real-life setting. By the end of this... more
Source code management systems are where code, ci-scripts, and Infrastructure as Code (IaC) scripts are stored and managed. That means that properly protecting the SCM is an important step towards... more
Hoy en día prácticamente cualquiera con algo de responsabilidad en una organización tiene que hacer en algún momento una presentación eficaz con la que comunicar sus ideas o los resultados de su t... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL