Introduction to Cyber Security
The world of interconnected computing devices surrounds us today and will continue to influence almost everything in our lives. The blood of computer networks are small packets of data that behave by means of the TCP/IP protocol. Initially TCP/IP wasn’t designed with security in mind and only after vulnerabilities were discovered did the field of computer security develop. The term “cyber” could be used for many things but today it is accepted as any information in a digital data form. Hence Cyber Security is about protecting that digital data from the many dangers that can destroy it. In this course students will learn about data protection and risk. We will discuss threats to computer systems and defensive strategies. Students will gain knowledge of protocols and how they work as well as the tools to measure them. Additionally, Cyber Security best practices will be shared.
Meet the Subject Matter Expert
chief consultant for InterNetwork Service, an Information, Communications and
Security services company, Tom is responsible for daily support of the IT
security infrastructure for many Philadelphia based firms. Tom regularly
maintains back office support for many of today's cutting edge technology
issues along with security evaluations, vulnerability assessments and
penetration tests. Tom is also an IT security trainer for a number of training
organizations and has delivered security training around the globe including
USA, EU, China and India. He has presented seminars at both Riverbed’s
Sharkfest and EC-Councils Hacker Halted conferences and regularly delivers
webinars on security related subjects.