YoVDO

Network Security

Offered By: Georgia Institute of Technology via Udacity

Tags

Network Security Courses Cryptography Courses Penetration Testing Courses Web Security Courses Malware Courses Cloud Security Courses Intrusion Detection Courses DDoS Attacks Courses Phishing Courses

Course Description

Overview

The summary for this course comes from the course web site at Georgia Tech. Note that watching this course on Udacity does not count for Georgia Tech credit unless you are enrolled in the Georgia Tech OMSCS program.

This course provides an introduction to computer and network security. Students successfully completing this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course begins with a tutorial of the basic elements of cryptography, cryptanalysis, and systems security, and continues by covering a number of seminal papers and monographs in a wide range of security areas.

Topics covered include network security, authentication, security protocol design and analysis, security modeling, trusted computing, key management, program safety, intrusion detection, DDOS detection and mitigation, architecture/operating systems security, security policy, group systems, biometrics, web security, and other emerging topics.

Most of the course readings will come from seminal papers in the field. Links to these papers will be provided on the course pages. In addition, links to critical reference materials will also be provided.


Syllabus

  • Large-Scale Attacks
    • DDoS Attacks,Malware-Based Attacks, Phishing, & Fraud,Underground infrastructures
  • Testing and Security Assessments
    • Penetration Testing,Social Engineering and Human Factors,Web Security Models & Security and Internet Protocols
  • Advanced Topics
    • Evasive and Mobile Malware,Botnet detection & Cloud Security,Attack-Tolerant Systems

Taught by

Wenke Lee and Catherine Gamboa

Tags

Related Courses

Algorithms with Numbers
Saint Petersburg State University via Coursera
Applied Cryptography
University of Colorado System via Coursera
Asymmetric Cryptography and Key Management
University of Colorado System via Coursera
Basic Cryptography and Programming with Crypto API
University of Colorado System via Coursera
Bitcoin and Cryptocurrencies
University of California, Berkeley via edX