Practical Computer Security I
Practical Computer Security I, available at $19.99, has an average rating of 3.9, with 36 lectures, based on 30 reviews, and has 139 subscribers.
You will learn about They will learn practical computer security. They will learn solutions on how to strengthen the security of their computers and mobile devices from malware and hackers. This course is ideal for individuals who are Everyone interested in Computer Security. That is pretty much everyone. It is particularly useful for Everyone interested in Computer Security. That is pretty much everyone.
Enroll now: Practical Computer Security I
Summary
Title: Practical Computer Security I
Price: $19.99
Average Rating: 3.9
Number of Lectures: 36
Number of Published Lectures: 36
Number of Curriculum Items: 36
Number of Published Curriculum Objects: 36
Original Price: $22.99
Quality Status: approved
Status: Live
What You Will Learn
- They will learn practical computer security. They will learn solutions on how to strengthen the security of their computers and mobile devices from malware and hackers.
Who Should Attend
- Everyone interested in Computer Security. That is pretty much everyone.
Target Audiences
- Everyone interested in Computer Security. That is pretty much everyone.
This course is a solid Introduction to Computer Security for absolute beginners. The most salient distinguishing feature of this course compared to other available Computer Security courses is that the only pre-requisite assumed is the casual use of standard computer tools, like web browsers, e-mail, etc.
Computer Security is a complex multifaceted subject. We read daily in newspapers stories of major breaches of Computer Security. It looks like the Bad Guys are winning the battle. We want to change all that and make your computing secure from the bad guys.
The goal of this course is to make this complex subject accessible to the average computer user. You do not need to understand in any depth computers, and yet we will explain to you in everyday language, without jargon or prior technical knowledge what you need to know to strengthen the security of your computing against the bad guys trying to penetrate your computers to harm you and or steal your sensitive information.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction – Welcome to Practical Computer Security I
Lecture 2: What Computers Can and Cannot do and Security implications
Lecture 3: What Computers Can and Cannot do and Security implications – + presentation
Lecture 4: What computers can and cannot do continued (& applications to computer Security)
Chapter 2: e-mail and text messaging is insecure
Lecture 1: e-mail and text messaging is insecure
Chapter 3: A review of famous major security breaches of the past
Lecture 1: Famous and infamous security breaches of the past
Lecture 2: The story of infamous legendary hacker Kevin Mitnick
Lecture 3: In 1988 Robert Tappan Morris' Internet Worm caused havoc on the Internet
Lecture 4: Further incidents: "I LOVE YOU" worm, STUXNET, and the Target stores Data Theft
Lecture 5: Hacking the 2016 Presidential Election, incidents of Ransomware, and the Equifax
Chapter 4: Malware: we study the various kinds of malware that plague computers
Lecture 1: Malware – Introduction to the variety of malware that threaten computer security
Lecture 2: Computer Viruses.
Lecture 3: Computer Worms
Lecture 4: Trojans, Backdoors,Logic Bombs, Root kits and AutoRooters, Root Access
Lecture 5: Root Access continued
Lecture 6: More malware types: Downloaders, Zombies, Kits, Spyware, and Key Loggers
Lecture 7: More Malware: Spammers,Flooders, Adware
Chapter 5: Evaluating your risk — your computer security model
Lecture 1: Your Computer Security Model
Chapter 6: Perimeter Defense and Firewalls
Lecture 1: Ineternet -Intranet Perimeter defense –Firewalls
Lecture 2: Perimeter Defense continued –More on basics on Firewalls
Chapter 7: Protecting Data with Encryption – An Introduction to Cryptography
Lecture 1: Encryption
Lecture 2: AES-256, Public Key Cryptography, RSA, PGP, Key Exchange protocols
Lecture 3: Implications to Computer Security and Conclusions
Lecture 4: Crypto Concepts & Applications. Message Confidentiality v. Message Integrity
Lecture 5: Stream Ciphers and RC4
Lecture 6: Collision resistant hash functions, & their use to achieve Message Integrity
Lecture 7: SHA a Collision resistant hash function, and more on Public Key Cryptography
Lecture 8: Message Integrity with Public Key Cryptography, Digital Signatures, Key Exchange
Chapter 8: Intruder Detection
Lecture 1: Know Your Enemy: Categories of Intruders
Lecture 2: Patterns of Hacker behavior used in IDS to detect intruders
Chapter 9: Practical UNIX Security
Lecture 1: UNIX Security: Users and Files
Lecture 2: The role of TRUST in Computer Security
Lecture 3: Passwords and Access controls in UNIX
Lecture 4: Access Controls in UNIX
Lecture 5: Availability, Fault Isolation, Audit
Lecture 6: Physical Security and Alternatives to Passwords
Instructors
-
Istvan Simon
UniversityProfessor and Computer Security Expert
Rating Distribution
- 1 stars: 2 votes
- 2 stars: 2 votes
- 3 stars: 5 votes
- 4 stars: 9 votes
- 5 stars: 12 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple