About Harvard University
Harvard University is a private Ivy League research university in Cambridge, Massachusetts, United States. Founded October 28, 1636, and named for its first benefactor, the Puritan clergyman John Harvard, it is the oldest institution of higher learning in the United States.
Description
This is CS50's introduction to cybersecurity for technical and non-technical audiences alike. Learn how to protect your own data, devices, and systems from today's threats and how to recognize and evaluate tomorrow's as well, both at home and at work. Learn to view cybersecurity not in absolute terms but relative, a function of risks and rewards (for an adversary) and costs and benefits (for you). Learn to recognize cybersecurity as a trade-off with usability itself. Course presents both high-level and low-level examples of threats, providing students with all they need know technically to understand both. Assignments inspired by real-world events. š What You'll Learn: Hacking, Cracking: Identify and understand hacking techniques and cracking methods. Social Engineering, Phishing Attacks: Learn how attackers manipulate people to gain access to sensitive information. Passcodes, Passwords, SSO: Manage security through passcodes, passwords, and Single Sign-On (SSO). Brute-Force Attacks, Dictionary Attacks: Understand how brute-force and dictionary attacks work to crack passwords. Biometrics: Use biometric data (fingerprints, face recognition, etc.) for secure authentication. Multi-Factor Authentication, Password Managers: Enhance security with multi-factor authentication and use password managers. Ethical Hacking: Learn the principles of ethical hacking to assess and improve system security. (Distributed) Denial-of-Service Attacks: Understand how DDoS attacks disrupt services by overwhelming systems. Viruses, Worms, Botnets: Learn about malicious software and botnets used for cyberattacks. SQL Injection Attacks: Understand how SQL injections exploit vulnerabilities in database-driven applications. Port-Scanning: Learn how port scanning identifies open ports in a network to detect potential vulnerabilities. Proxies, Firewalls: Use proxies and firewalls to protect systems from unauthorized access and attacks. Automatic Updates: Understand the importance of automatic updates for software security. Closed-Source, Open-Source Software: Explore the differences between closed-source and open-source software from a security perspective. Buffer-Overflow Attacks: Learn how buffer-overflow attacks exploit system vulnerabilities. Secure Deletion: Understand the methods of securely deleting data to prevent unauthorized access. Hashing, Salting: Use hashing and salting techniques to securely store passwords and sensitive data. Secret-Key, Public-Key Encryption, Digital Signatures: Implement encryption techniques and digital signatures for secure data transmission. Full-Disk Encryption, Ransomware: Learn how full-disk encryption protects data, and how to defend against ransomware. Cookies, Sessions, Incognito Mode: Understand how cookies and sessions are used in web security, and the role of incognito mode. Anonymization, De-identification: Learn how anonymization and de-identification protect privacy and personal information. Verification: Understand the verification processes used to ensure data integrity and authentication. Operating Systems, App Stores: Study operating system security and the role of app stores in preventing malicious software. š Associated Skills: Usability, Cyber Security
Field of Study
Computer Science for Cybersecurity
Terms and Conditions
The applicants shall: ā