Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Cyberspace is the 21st century's greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these lessons will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we're learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Stuxnet—The First Cyber Guided Missile|
Stuxnet was the world's first cyber virus. This video shares how Stuxnet made us critically think of cyberspace and cybersecurity.
Prof. Rosenzweig discusses how Stuxnet—the world's first cyber virus—transformed the world and changed our life. Stuxnet not only caused malfunctioning of the uranium enrichment facility in Natanz, Iran, but also made the world think of cybersecurity measures because of our vulnerability to cyber attacks and their large-scale consequences. Find out how.
|Stuxnet—the world's first cyber virus—has made us contemplate cyberspace, our vulnerabilities to cyber attacks and their serious consequences, and cybersecurity for common good. This short video explains the significance of outlining cybersecurity measures, especially considering the pace of our technological advances.|
|Section 2: Of Viruses, Botnets, and Logic Bombs|
|Brain. A. was the first known virus to infect a personal computer. It was first detected in 1986, and since then, we have been experiencing real threats in cyberspace. This video introduces the 4 Ds of computer hacking and explains how we have become vulnerable to cyber attacks.|
|Were you ever denied service when trying to access your bank account or your credit information online, when making an event reservation or shopping online, or when doing any other thing? If yes, it is possible that the servers were overwhelmed by a Distributed Denial of Service (DDoS) attack at that time. This video explains how and why a DDoS is executed.|
|Botnets, Slave Zombies, Command and Control, Spiders, and Web Crawlers are not part of a fantasy video game playing out in cyberspace. Botnets are a real threat to large corporations and individuals. What are they? Watch the video to find out.|
Perpetrators of a Trojan attack make use of a historical ploy to gain access to computer systems and wreak havoc. In this video, Prof. Rosenzweig illustrates how this type of cyber intrusion works.
|In this video, you will learn how Advanced Persistent Threats (APTs) and logic bombs bide their time until an opportune moment to “explode” in your system, and look at how attackers exploit the concept of a zero-day vulnerability.|
In this video, Prof. Rosenzweig of The George Washington University Law School speaks about the economic costs of cyber crime and cyber intrusions; he also explains why we do not have adequate information about the number of daily intrusions.
|Section 3: Cyber Fraud, Theft, and Organized Crime|
If you or someone you know has ever been a victim of cyber crime that involved theft of money or identity, you know how distressing that experience was. To help you understand how a majority of these cyber crimes are perpetrated, Prof. Rosenzweig of The George Washington University Law School takes you on a quick tour of fraud and identity thefts in cyberspace and illustrates the curious case of Nigerian scam artists.
|Before sharing personal information online, do you look for the little closed lock symbol in the browser address bar? If you did not know, the lock indicates a secure, encrypted connection. We are often in a hurry and forget that identity thefts in cyberspace need the slightest lapse in concentration to wreak havoc in our personal lives. Watch this video to learn more about identity thefts and about organized crime syndicates, such as the Russian Business Network (RBN).|
|In this video, Prof. Rosenzweig of The George Washington University Law School shares that economic espionage is rampant, and we are not immune to it.Further, he also explains illegal intrusions into computer systems and draws our attention to the Computer Fraud and Abuse Act (CFAA) by citing examples.|
|Will we always be at the mercy of criminal networks and botnets that harm us? This video provides information about in rem actions that cut off a criminal network and kill it. Prof. Rosenzweig of The George Washington University Law School explains that such actions require a great deal of time and investment, but we can cut off and kill a network. To help us comprehend, he gives examples of the Coreflood botnet and online piracy.|
|After several years of elucidation by the media, we know that cyber crime can be transnational in character and can present complex forensic challenges. This is also the perspective of Prof. Rosenzweig of The George Washington University Law School in this video. But what are federal governments and international councils doing about preventing or addressing cyber crimes? Watch the video to know.|
|Section 4: Protecting Yourself in Cyberspace|
|You should know how to protect yourself from cyber attacks. In this video, Prof. Rosenzweig of The George Washington University Law School offers tips that can make you safer in cyberspace.|
|In our digital life, we are often juggling multiple accounts and employing the same simple password for several logins. However, as long as there are intelligently designed password-cracking programs, our accounts are at a risk of being hacked. Watch this video to learn how you can protect yourself.|
|Cyber criminals use advanced techniques for siphoning dollars from your bank accounts. Watch as Prof. Rosenzweig of The George Washington University Law School highlights the significance of security programs.|
In this video, Prof. Rosenzweig of The George Washington University Law School shows you a data-centric approach to safeguarding your information.
In this video, Prof. Rosenzweig of The George Washington University Law School warns of the grave consequences of leaving footprints in the virtual world. He offers tips for keeping you safe from criminals armed with cameras that capture your information.
We routinely expose personal information over Wi-Fi hotspots and make them enticing targets for surreptitious hackers. Watch this video to learn how you can defend your networks and defeat cyber criminals.
The Great Courses is the premier publisher of educational video and audio courses that are designed to meet the powerful and rapidly growing consumer demand for personal development and lifelong learning. The pioneer of the concept of engaging, direct-to-consumer university-level courses, The Great Courses has a catalog of more than 450 courses led by the world’s top professors and experts in a broad range of subjects across science, mathematics, philosophy, history, literature, fine arts and music, better living, business, and personal development. Our esteemed faculty members are drawn from the most respected institutions in the world and, uniquely, are selected by our customers exclusively for their ability to teach. Our courses, too, are produced only after we survey our community of lifelong learners on course concepts and gain their approval. The result—compelling courses taught by engaging instructors at the top of their fields.