To account for the video time in the certificate, wait for the video to shut down automatically. The next video of the course will be triggered next.

Illicit Data Interception and Access - Information Security Lesson #5 of 12

Dr. Soper discusses illicit data interception and illicit data access in the context of information security. Topics covered include man-in-the-middle attacks, keystroke loggers, physical attacks, social engineering, insider threats, computer forensics, and the principle of least privilege.

Next

Encryption Concepts - Information Security Lesson #6 of 12

Dr. Soper discusses encryption concepts. Topics covered include encryption algorithms, keyed and keyless cryptosystems, cryptanalysis, breaking encrypted messages, substitution, transposition, and product ciphers, the Caesar cipher, the Vigenère cipher, one-time pads, the Vernam cipher, book ciphers, symmetric and asymmetric cryptosystems, public-key encryption, stream ciphers, block ciphers, the data encryption standard (DES), and the advanced encryption standard (AES).

Course Classes
Information security lessons with Daniel

10

Introduction to Computer Security - Information Security Lesson #1 of 1241m

Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, types of attackers, methods of defense, and multi-layered security.

Identification and Authentication - Information Security Lesson #2 of 1238m

Dr. Soper discusses identification and authentication issues in the context of computer security. Topics covered include controlled access, impersonation, authentication failures, methods of attacking passwords (including dictionary attacks, brute-force attacks, identifying passwords likely for a specific user, etc.), biometric authentication, and multifactor authentication.

Software Program Security - Information Security Lesson #3 of 1234m

Dr. Soper discusses software program security. Topics covered include incomplete mediation, race conditions, time-of-check to time-of-use vulnerabilities, backdoors, intentional and unintentional program flaws, the "penetrate and patch" method, security in the context of the software development life cycle, controls against software program threats, modularity, encapsulation and information hiding, mutual suspicion and confinement, fault detection and fault tolerance, configuration management, testing, and software development standards in the context of information security.

Malicious Code (Malware) - Information Security Lesson #4 of 1230m

Dr. Soper discusses malware in the context of information security. Topics covered include viruses, worms, Trojan horses, zombies, logic bombs, rabbits, trapdoors, script attacks, attributes of malicious code, how viruses work, methods of hiding a virus, virus detection and removal, and malware hygiene.

Illicit Data Interception and Access - Information Security Lesson #5 of 1226m

Dr. Soper discusses illicit data interception and illicit data access in the context of information security. Topics covered include man-in-the-middle attacks, keystroke loggers, physical attacks, social engineering, insider threats, computer forensics, and the principle of least privilege.

Encryption Concepts - Information Security Lesson #6 of 1201h02m

Dr. Soper discusses encryption concepts. Topics covered include encryption algorithms, keyed and keyless cryptosystems, cryptanalysis, breaking encrypted messages, substitution, transposition, and product ciphers, the Caesar cipher, the Vigenère cipher, one-time pads, the Vernam cipher, book ciphers, symmetric and asymmetric cryptosystems, public-key encryption, stream ciphers, block ciphers, the data encryption standard (DES), and the advanced encryption standard (AES).

Firewalls and Network Security - Information Security Lesson #7 of 1234m

Dr. Soper discusses firewalls and network security. Topics covered include network vulnerabilities, port scanning, network segmentation, firewall security policies, the OSI reference model, packet filtering gateways, stateful inspection firewalls, application proxy gateways, circuit-level gateways, guards, personal firewalls, encryption in the context of network security, network address translation (NAT), and establishing a network security perimeter.

Wireless Security - Information Security Lesson #8 of 1229m

Dr. Soper discusses security for wireless networks. Topics covered include wireless network concepts, wireless communication, the 802.11 protocol suite, wireless data frames, management frames, wireless network vulnerabilities, MAC spoofing, wired equivalent privacy (WEP), Wi-Fi protected access (WPA and WPA2), and methods of attacking wireless networks.

Data Interception and Public Key Encryption - Information Security Lesson #9 of 1228m

Dr. Soper discusses malicious data interception and public key encryption. Topics covered include wiretapping, defending against message interception, network encryption methods, the key exchange problem, public key encryption, RSA encryption, and key exchange using public key encryption.

Forgeries and Digital Identities - Information Security Lesson #10 of 1237m

Dr. Soper discusses forgeries of digital artifacts and digital identities. Topics covered include forged email messages, phishing, spam, forged websites and software, online impersonation, cryptographic seals, online identities, digital signatures, using public key encryption for digital signatures, trust in cyberspace, digital certificates, and certificate authorities.

Denial of Service and Intrusion Detection - Information Security Lesson #11 of 1227m

Dr. Soper discusses denial of service attacks and intrusion detection systems. Topics covered include types of denial of service (DoS) attacks, connection flooding, echo chargen attacks, ping of death attacks, smurf attacks, SYN flood attacks, teardrop attacks, distributed denial of service (DDoS) attacks, the scope and operational modes of intrusion detection systems (IDS), and IDS goals and responses to attacks.

Information Privacy - Information Security Lesson #12 of 1243m

Dr. Soper discusses issues relating to information privacy. Topics covered include technology-related privacy concerns, fair information collection principles, privacy laws, information privacy and the government, multiple identities, identity theft, privacy policies, privacy and social networks, privacy and online payments, preference tracking, targeted advertising, tracking cookies, privacy and email, and privacy and emerging technologies.

Our project is also available at:
Spanish Portuguese Hindi

Our best free courses

1

English lessons by Sonia

07 hours and 15 minutes

183

2

Web Development for beginners by LearnCode.academy

05 hours and 21 minutes

179

3

First Aid Training by St John Ambulance

02 hours and 40 minutes

165

4

Business Administration by Animate U

01 hours and 25 minutes

148

5

Android for beginners by The new boston

10 hours and 47 minutes

127

6

Social media marketing by Freemium

02 hours and 01 minutes

114

7

Business english course by BED

02 hours and 44 minutes

103

8

Self-Defense by Ando Mierzwa

01 hours and 24 minutes

101

9

English grammar by Oxford Online English

05 hours and 37 minutes

93

10

Investing like Warren Buffett with Preston Pysh

03 hours and 29 minutes

92

11

Human resource management concepts by Gregg Learning

08 hours and 14 minutes

90

12

Computer Science by CrashCourse

07 hours and 54 minutes

89

Get to know a little about our project that has been changing the lives of thousands of people through free courses.

+700 free courses +300 categories +1 million downloads +50 Thousand certificates issued Courses in 3 different languages

Found a good course on youtube and want to see it in our project, click here to indicate new courses.