Intro to Information Security

Intro to Information Security

This content is rated 0 out of 5
  • From
  • Self-paced
  • Free Access
More info
  • Introductive Level

Their employees are learning daily with Edflex

  • Safran
  • Air France
  • TotalEnergies
  • Generali
Learn more

Course details


The course will be organized around a few broad themes: • Foundations: security mindset, essential concepts (policy, CIA, etc.) • Software security: vulnerabilities and protections, malware, program analysis • Practical cryptography: encryption, authentication, hashing, symmetric and asymmetric crypto • Networks: wired and wireless networks, protocols, attacks and countermeasures • Applications and special topics: databases, web apps, privacy and anonymity, voting, public policy The course is divided into three parts: Part 1: Part 2: Part 3:




  • Wenke Lee - Wenke Lee, Ph.D., is co-director of the new Institute for Information Security & Privacy (IISP) and responsible for continuing Georgia Tech's international leadership in cyber security research and education. Additionally, he is a professor of Computer Science in the College of Computing at Georgia Tech where he has taught since 2001 and served as director of the Georgia Tech Information Security Center (GTISC) research lab from 2012 to 2015. Lee is one of the most prolific and influential security researchers in the world. He has published several dozen, oft-cited research papers at top academic conferences, including the ACM Conference on Computer and Communications Security, USENIX Security, IEEE Security & Privacy ("Oakland"), and the Network & Distributed System Security (NDSS) Symposium.
  • Mustaque Ahamad - Professor Mustaque Ahamad, Ph.D., teaches in the College of Computing at Georiga Tech and is associate director of educational programs for the Institute for Information Security & Privacy. He has been associated with the Georgia Tech Information Security Center since 1998, including serving as its director from 2004 to 2012. GTIISP seeks to proactively work on understanding challenges associated with workforce development in cyber security. With oversight of formal degree programs and continuing education for working professionals, he is an advocate for greater cybersecurity education and training in order to meet the collective needs of industry and government. Professor Ahamad's research interests are in the areas of converged communications security and security of healthcare systems. As smart phone like devices enable ubiquitous access to web and voice channels, the convergence of telephony with the Internet gives rise to new cross-channel threats that can combine online and voice attacks. For example, voice phishing with caller-id spoofing has been reported for stealing online banking credentials. His data-driven research approach for exploring cross-channel threats has resulted in better understanding of these threats and more effective ways to combat them. In the healthcare security area, he has worked on monitoring for detection of abuse and fraud.


The Georgia Institute of Technology, also known as Georgia Tech or GT, is a co-educational public research university located in Atlanta, Georgia, USA. It is part of the wider University System of Georgia network. Georgia Tech has offices in Savannah (Georgia, USA), Metz (France), Athlone (Ireland), Shanghai (China), and Singapore.

Georgia Tech's reputation is built on its engineering and computer science programmes, which are among the best in the world5,6. The range of courses on offer is complemented by programmes in the sciences, architecture, humanities and management.


Udacity is a for-profit educational organization founded by Sebastian Thrun, David Stavens, and Mike Sokolsky offering massive open online courses (MOOCs). According to Thrun, the origin of the name Udacity comes from the company's desire to be "audacious for you, the student". While it originally focused on offering university-style courses, it now focuses more on vocational courses for professionals.

This content is rated 4.5 out of 5
(no review)
This content is rated 4.5 out of 5
(no review)
Complete this resource to write a review