Information Security - Advanced topics

Learn more fundamentals of information security, including Injection Attacks and Defenses, Privacy and Anonymity Software Validity and Rights, Cryptocurrency. This is a self-paced course that provides a continuation of information security and cybersecurity topics. Among the topics covered are Injection Attacks and Defenses, Privacy and Anonymity Software Validity and Rights, Cryptocurrency. Students start with a high-level view of prevalent attacks on web applications and cover some strategies for mitigating those attacks. We will look at three major attacks in this lesson: Cross-Site Scripting (XSS), SQL Injection, and request forgery (CSRF) attacks. We follow up with a look at the privacy and different methods users can obtain anonymity. Next, we take a look at digital rights management and trusted computing. We hypothesize how we know the software and hardware we are running is legitimate and has not been modified or stolen.

Course syllabus:

  1. Injection Attacks and Defenses

  2. Privacy and Anonymity

  3. Software Validity and Rights

  4. Cryptocurrency

  5. Final Exam