About this Course

The summary for this course comes from the course web site at Georgia Tech. Note that watching this course on Udacity does not count for Georgia Tech credit unless you are enrolled in the Georgia Tech OMSCS program.

This course provides an introduction to computer and network security. Students successfully completing this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course begins with a tutorial of the basic elements of cryptography, cryptanalysis, and systems security, and continues by covering a number of seminal papers and monographs in a wide range of security areas.

Topics covered include network security, authentication, security protocol design and analysis, security modeling, trusted computing, key management, program safety, intrusion detection, DDOS detection and mitigation, architecture/operating systems security, security policy, group systems, biometrics, web security, and other emerging topics.

Most of the course readings will come from seminal papers in the field. Links to these papers will be provided on the course pages. In addition, links to critical reference materials will also be provided.

Course Cost
Free
Timeline
Approx. 16 weeks
Skill Level
Intermediate
Included in Course
  • Rich Learning Content

  • Interactive Quizzes

  • Taught by Industry Pros

  • Self-Paced Learning

  • Student Support Community

Join the Path to Greatness

This free course is your first step towards a new career with the Data Analyst Nanodegree Program.

Free Course

Network Security

by Georgia Institute of Technology

Enhance your skill set and boost your hirability through innovative, independent learning.

Icon steps 54aa753742d05d598baf005f2bb1b5bb6339a7d544b84089a1eee6acd5a8543d

Course Leads

  • Wenke Lee
    Wenke Lee

    Instructor

  • Catherine Gamboa
    Catherine Gamboa

    Instructor

What You Will Learn

Lesson 1

Large-Scale Attacks

  • DDoS Attacks
  • Malware-Based Attacks, Phishing, & Fraud
  • Underground infrastructures
Lesson 1

Large-Scale Attacks

  • DDoS Attacks
  • Malware-Based Attacks, Phishing, & Fraud
  • Underground infrastructures
Lesson 2

Testing and Security Assessments

  • Penetration Testing
  • Social Engineering and Human Factors
  • Web Security Models & Security and Internet Protocols
Lesson 2

Testing and Security Assessments

  • Penetration Testing
  • Social Engineering and Human Factors
  • Web Security Models & Security and Internet Protocols
Lesson 3

Advanced Topics

  • Evasive and Mobile Malware
  • Botnet detection & Cloud Security
  • Attack-Tolerant Systems
Lesson 3

Advanced Topics

  • Evasive and Mobile Malware
  • Botnet detection & Cloud Security
  • Attack-Tolerant Systems

Prerequisites and Requirements

To succeed in this course, you should have:

  • Intermediate to advanced programming knowledge
  • Knowledge of basic computer networking principles
  • Knowledge of basic information security principles

See the Technology Requirements for using Udacity.

Why Take This Course

You should take this course if you want to:

  • Understand the importance of network security in the modern technological world.
  • Create systems that are resistant to modern attacks.
  • Follow the latest trends in attack and defense technologies.
What do I get?
  • Instructor videos
  • Learn by doing exercises
  • Taught by industry professionals
Icon globe e82eae5d45465aba4fbe4bb746905ce55dc3324f310b79c60e4a20089057d347

Udacity 现已提供中文版本! A Udacity tem uma página em português para você! There's a local version of Udacity for you! Sprechen Sie Deutsch?

Besuchen Sie de.udacity.com und entdecken Sie lokale Angebote, unsere Partnerunternehmen und Udacitys deutschsprachigen Blog.

前往优达学城中文网站 Ir para a página brasileira Go to Indian Site Icon flag de deedb1a7a695700236cb6ef4204ddbede5d197dab9b47716c87a0b4d5d9fc325 Zu de.udacity.com continue in English