Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Understanding and Avoiding Threats in Cyberspace to your Wishlist.

Add to Wishlist

Understanding and Avoiding Threats in Cyberspace

Understand and avoid threats in cyberspace
4.4 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
94 students enrolled
Last updated 5/2015
$10 $50 80% off
1 day left at this price!
30-Day Money-Back Guarantee
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Gain new insights into how vulnerable we really are to cyber attacks.
Get a better understanding of the advantages, complexities and threats of the cyber world.
Learn to identify specific threats including Botnets, Slave Zombies, Command and Control, Spiders, Web Crawlers, Trojan attacks, APTs, and Logic Bombs..
Trace the steps of scam artists to see how cyber crimes are perpetrated and understand how to protect yourself from cyber attacks.
Learn the latest tips and techniques for safeguarding all your personal information, learn how to defend your networks, and see how security systems work.
View Curriculum
  • No prior knowledge is required

Cyberspace is the 21st century's greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these lessons will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we're learning how to understand, manage, and reduce these dangers.

In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government.
Who is the target audience?
  • This course offers the essential knowledge for anyone who wants to be literate about cybersecurity issues in the 21st century.
  • Excellent for beginners and experts alike.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 20 Lectures Collapse All 20 Lectures 01:17:36
Stuxnet—The First Cyber Guided Missile
3 Lectures 10:45

Stuxnet was the world's first cyber virus. This video shares how Stuxnet made us critically think of cyberspace and cybersecurity.

Preview 02:36

Prof. Rosenzweig discusses how Stuxnet—the world's first cyber virus—transformed the world and changed our life. Stuxnet not only caused malfunctioning of the uranium enrichment facility in Natanz, Iran, but also made the world think of cybersecurity measures because of our vulnerability to cyber attacks and their large-scale consequences. Find out how.

Preview 04:32

Stuxnet—the world's first cyber virus—has made us contemplate cyberspace, our vulnerabilities to cyber attacks and their serious consequences, and cybersecurity for common good. This short video explains the significance of outlining cybersecurity measures, especially considering the pace of our technological advances.
Preview 03:37
Of Viruses, Botnets, and Logic Bombs
6 Lectures 24:03
Brain. A. was the first known virus to infect a personal computer. It was first detected in 1986, and since then, we have been experiencing real threats in cyberspace. This video introduces the 4 Ds of computer hacking and explains how we have become vulnerable to cyber attacks.
Vulnerability in Cyberspace—An Everyday Reality

Were you ever denied service when trying to access your bank account or your credit information online, when making an event reservation or shopping online, or when doing any other thing? If yes, it is possible that the servers were overwhelmed by a Distributed Denial of Service (DDoS) attack at that time. This video explains how and why a DDoS is executed.
DDoS Attack—Flooding a Website with Requests to Connect

Botnets, Slave Zombies, Command and Control, Spiders, and Web Crawlers are not part of a fantasy video game playing out in cyberspace. Botnets are a real threat to large corporations and individuals. What are they? Watch the video to find out.
Botnets—Networks of Controlled Computers

Perpetrators of a Trojan attack make use of a historical ploy to gain access to computer systems and wreak havoc. In this video, Prof. Rosenzweig illustrates how this type of cyber intrusion works.

Trojan—A Subtle Attack with Dire Consequences

In this video, you will learn how Advanced Persistent Threats (APTs) and logic bombs bide their time until an opportune moment to “explode” in your system, and look at how attackers exploit the concept of a zero-day vulnerability.
“You’re under Surveillance”: How APTs and Logic Bombs Play a Waiting Game

In this video, Prof. Rosenzweig of The George Washington University Law School speaks about the economic costs of cyber crime and cyber intrusions; he also explains why we do not have adequate information about the number of daily intrusions.

Economic Costs of Cyber Crime and Cyber Intrusions
Cyber Fraud, Theft, and Organized Crime
5 Lectures 18:00

If you or someone you know has ever been a victim of cyber crime that involved theft of money or identity, you know how distressing that experience was. To help you understand how a majority of these cyber crimes are perpetrated, Prof. Rosenzweig of The George Washington University Law School takes you on a quick tour of fraud and identity thefts in cyberspace and illustrates the curious case of Nigerian scam artists.

Burned in Cyberspace: Fraud and Identity Thefts

Before sharing personal information online, do you look for the little closed lock symbol in the browser address bar? If you did not know, the lock indicates a secure, encrypted connection. We are often in a hurry and forget that identity thefts in cyberspace need the slightest lapse in concentration to wreak havoc in our personal lives. Watch this video to learn more about identity thefts and about organized crime syndicates, such as the Russian Business Network (RBN).
The Closed Lock Icon: The Key to Keeping Hackers Out

In this video, Prof. Rosenzweig of The George Washington University Law School shares that economic espionage is rampant, and we are not immune to it.Further, he also explains illegal intrusions into computer systems and draws our attention to the Computer Fraud and Abuse Act (CFAA) by citing examples.
You Are Not Immune! Economic Espionage and Intrusions into Computer Systems

Will we always be at the mercy of criminal networks and botnets that harm us? This video provides information about in rem actions that cut off a criminal network and kill it. Prof. Rosenzweig of The George Washington University Law School explains that such actions require a great deal of time and investment, but we can cut off and kill a network. To help us comprehend, he gives examples of the Coreflood botnet and online piracy.
In Rem Actions—Cutting off a Criminal Cyber Network at the Knees

After several years of elucidation by the media, we know that cyber crime can be transnational in character and can present complex forensic challenges. This is also the perspective of Prof. Rosenzweig of The George Washington University Law School in this video. But what are federal governments and international councils doing about preventing or addressing cyber crimes? Watch the video to know.
How to Catch a Cyber Criminal
Protecting Yourself in Cyberspace
6 Lectures 24:48
You should know how to protect yourself from cyber attacks. In this video, Prof. Rosenzweig of The George Washington University Law School offers tips that can make you safer in cyberspace.
“Coding the Matrix”: Protecting Yourself in Cyberspace

In our digital life, we are often juggling multiple accounts and employing the same simple password for several logins. However, as long as there are intelligently designed password-cracking programs, our accounts are at a risk of being hacked. Watch this video to learn how you can protect yourself.
Protecting Yourself with Good Passwords

Cyber criminals use advanced techniques for siphoning dollars from your bank accounts. Watch as Prof. Rosenzweig of The George Washington University Law School highlights the significance of security programs.
Keep Your Personal Data Safe - Installing Security Programs in your Devices

In this video, Prof. Rosenzweig of The George Washington University Law School shows you a data-centric approach to safeguarding your information.

The Power of Encryption and Data Erasing Programs

In this video, Prof. Rosenzweig of The George Washington University Law School warns of the grave consequences of leaving footprints in the virtual world. He offers tips for keeping you safe from criminals armed with cameras that capture your information.

The Footprints We Leave in Cyberspace and Their Consequences

We routinely expose personal information over Wi-Fi hotspots and make them enticing targets for surreptitious hackers. Watch this video to learn how you can defend your networks and defeat cyber criminals.

How to Be Safe in a WI-FI Network
About the Instructor
4.6 Average rating
763 Reviews
7,341 Students
9 Courses
Experience the Joy of Lifelong Learning

The Great Courses is the premier publisher of educational video and audio courses that are designed to meet the powerful and rapidly growing consumer demand for personal development and lifelong learning. The pioneer of the concept of engaging, direct-to-consumer university-level courses, The Great Courses has a catalog of more than 450 courses led by the world’s top professors and experts in a broad range of subjects across science, mathematics, philosophy, history, literature, fine arts and music, better living, business, and personal development. Our esteemed faculty members are drawn from the most respected institutions in the world and, uniquely, are selected by our customers exclusively for their ability to teach. Our courses, too, are produced only after we survey our community of lifelong learners on course concepts and gain their approval. The result—compelling courses taught by engaging instructors at the top of their fields.

Report Abuse