Les infos clés
This course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge — both undergraduate and graduate — understand this important priority in society today. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on). In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy.
The course will be organized around a few broad themes: • Foundations: security mindset, essential concepts (policy, CIA, etc.) • Software security: vulnerabilities and protections, malware, program analysis • Practical cryptography: encryption, authentication, hashing, symmetric and asymmetric crypto • Networks: wired and wireless networks, protocols, attacks and countermeasures • Applications and special topics: databases, web apps, privacy and anonymity, voting, public policy The course is divided into three parts: Part 1: Part 2: Part 3:
- Wenke Lee - Wenke Lee, Ph.D., is co-director of the new Institute for Information Security & Privacy (IISP) and responsible for continuing Georgia Tech's international leadership in cyber security research and education. Additionally, he is a professor of Computer Science in the College of Computing at Georgia Tech where he has taught since 2001 and served as director of the Georgia Tech Information Security Center (GTISC) research lab from 2012 to 2015. Lee is one of the most prolific and influential security researchers in the world. He has published several dozen, oft-cited research papers at top academic conferences, including the ACM Conference on Computer and Communications Security, USENIX Security, IEEE Security & Privacy ("Oakland"), and the Network & Distributed System Security (NDSS) Symposium.
- Mustaque Ahamad - Professor Mustaque Ahamad, Ph.D., teaches in the College of Computing at Georiga Tech and is associate director of educational programs for the Institute for Information Security & Privacy. He has been associated with the Georgia Tech Information Security Center since 1998, including serving as its director from 2004 to 2012. GTIISP seeks to proactively work on understanding challenges associated with workforce development in cyber security. With oversight of formal degree programs and continuing education for working professionals, he is an advocate for greater cybersecurity education and training in order to meet the collective needs of industry and government. Professor Ahamad's research interests are in the areas of converged communications security and security of healthcare systems. As smart phone like devices enable ubiquitous access to web and voice channels, the convergence of telephony with the Internet gives rise to new cross-channel threats that can combine online and voice attacks. For example, voice phishing with caller-id spoofing has been reported for stealing online banking credentials. His data-driven research approach for exploring cross-channel threats has resulted in better understanding of these threats and more effective ways to combat them. In the healthcare security area, he has worked on monitoring for detection of abuse and fraud.
Udacity est une entreprise fondé par Sebastian Thrun, David Stavens, et Mike Sokolsky offrant cours en ligne ouvert et massif.
Selon Thrun, l'origine du nom Udacity vient de la volonté de l'entreprise d'être "audacieux pour vous, l'étudiant ". Bien que Udacity se concentrait à l'origine sur une offre de cours universitaires, la plateforme se concentre désormais plus sur de formations destinés aux professionnels.