Intro to Information Security - Georgia Tech
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
This course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge — both undergraduate and graduate — understand this important priority in society today. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on).
In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy.
Facilities
Location
Start date
Start date
Reviews
Subjects
- IT Security
- Security
- Networks
- CS 6035
- CS
Course programme
Approx. 0
Built by Join thousands of students Course SummaryThis course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge — both undergraduate and graduate — understand this important priority in society today. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on).
In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy.
Why Take This Course? Prerequisites and RequirementsSee the Technology Requirements for using Udacity.
SyllabusThe course will be organized around a few broad themes:
• Foundations: security mindset, essential concepts (policy, CIA, etc.)
• Software security: vulnerabilities and protections, malware, program analysis
• Practical cryptography: encryption, authentication, hashing, symmetric and asymmetric crypto
• Networks: wired and wireless networks, protocols, attacks and countermeasures • Applications and special topics: databases, web apps, privacy and anonymity, voting, public policy
The course is divided into three parts: Part 1: Part 2: Part 3:
Intro to Information Security - Georgia Tech