Learn about traditional and mobile malware, the security threats they represent, state-of-the-art analysis and detection techniques, and the underground ecosystem that drives such a profitable but illegal business.
Cybercrime has become both more widespread and harder to battle. Researchers and anecdotal experience show that the cybercrime scene is becoming increasingly organized and consolidated, with strong links also to traditional criminal networks. Modern attacks are indeed stealthy and often profit oriented.
Malicious software (malware) is the traditional way in which cybercriminals infect user and enterprise hosts to gain access to their private, financial, and intellectual property data. Once stolen, such information can enable more sophisticated attacks, generate illegal revenue, and allow for cyber-espionage.
By mixing a practical, hands-on approach with the theory and techniques behind the scene, the course discusses the current academic and underground research in the field, trying to answer the foremost question about malware and underground economy, namely, "Should we care?".
Students will learn how traditional and mobile malware work, how they are analyzed and detected, peering through the underground ecosystem that drives this profitable but illegal business. Understanding how malware operates is of paramount importance to form knowledgeable experts, teachers, researchers, and practitioners able to fight back.
This course gives an introduction into the field of terrorism & counterterrorism studies. It will help you to analyze and understand these complex phenomena and discuss its impact on society with a global audience. Students, policy makers, journalists or anyone with a strong interest in understanding issues like the history, origins and nature of terrorism, security, fear management, resilience, politics, violence, foreign fighters and radicalization will find the course most relevant.
This course uses the lives, ideals and achievements of Theodore, Franklin, and Eleanor Roosevelt to create the idea of a Rooseveltian century. It is about doing research, analyzing primary sources, and connecting all this information with a coherent and logical interpretation. It is an invitation to think critically and historically, and it wants to give you a glimpse of what it means to be a historian at work.
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
CISSP is the basis of advanced information assurance knowledge for IT professionals. Often referred to as the “gold standard” of security certifications, CISSP is one of the most important distinctions an IT professional can have on their resume. And it’s for good reason too: a CISSP certification verifies one has mastery of a multitude of information assurance and cyber security topics, something that’s necessary for IT management and leadership (a job that many CISSP holders fulfill). Our free online CISSP training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.
For IT professionals looking to enhance their security skills in areas such as enterprise security, risk management, integrating computing and research and analysis, CASP training is ideal. The CASP certification validates one’s knowledge of advanced security concepts and proves that an individual is capable of the critical thinking necessary to develop effective solutions. In our free online CompTIA CASP training, you’ll learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.
You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air.
This course bring together all the essential ingredients to build a secure WordPress website. This course teaches you various tips and tricks which ensures that you website and your business is protected from malicious hackers. The course presents the contents in a easy to understand way and does not assume any technical knowledge. This quick course will help you secure your website assets and will update with the latest tactics and strategies for WordPress Security. This is a free course with a MOOC List coupon.
This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.