Intro to Information Security - Georgia Tech

Udacity
Online

Free

Important information

  • Course
  • Online
  • When:
    Flexible
Description

This course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge — both undergraduate and graduate — understand this important priority in society today. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on).

In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy.

Important information
Venues

Where and when

Starts Location
Flexible
Online

What you'll learn on the course

Security
Networks
CS
IT Security
CS 6035

Course programme

Intermediate

Approx. 0

Built by Join thousands of students Course Summary

This course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge — both undergraduate and graduate — understand this important priority in society today. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on).

In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy.

Why Take This Course? Prerequisites and Requirements

See the Technology Requirements for using Udacity.

Syllabus

The course will be organized around a few broad themes:

• Foundations: security mindset, essential concepts (policy, CIA, etc.)

• Software security: vulnerabilities and protections, malware, program analysis

• Practical cryptography: encryption, authentication, hashing, symmetric and asymmetric crypto

• Networks: wired and wireless networks, protocols, attacks and countermeasures • Applications and special topics: databases, web apps, privacy and anonymity, voting, public policy

The course is divided into three parts: Part 1: Part 2: Part 3: