This experience is optimized for Internet Explorer version 9 and above.

Please upgrade your browser

Send the Gift of Lifelong Learning!

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Professor Paul Rosenzweig,
The George Washington University Law School

Gifting Information


To send your gift, please complete the form below. An email will be sent immediately to notify the recipient of your gift and provide them with instructions to redeem it.

  • 500 characters remaining.

Frequently Asked Questions

With an eGift, you can instantly send a Great Course to a friend or loved one via email. It's simple:
1. Find the course you would like to eGift.
2. Under "Choose a Format", click on Video Download or Audio Download.
3. Click 'Send e-Gift'
4. Fill out the details on the next page. You will need to the email address of your friend or family member.
5. Proceed with the checkout process as usual.
Q: Why do I need to specify the email of the recipient?
A: We will send that person an email to notify them of your gift. If they are already a customer, they will be able to add the gift to their My Digital Library and mobile apps. If they are not yet a customer, we will help them set up a new account so they can enjoy their course in their My Digital Library or via our free mobile apps.
Q: How will my friend or family member know they have a gift?
A: They will receive an email from The Great Courses notifying them of your eGift. The email will direct them to If they are already a customer, they will be able to add the gift to their My Digital Library and mobile apps. If they are not yet a customer, we will help them set up a new account so they can enjoy their course in their My Digital Library or via our free mobile apps.
Q: What if my friend or family member does not receive the email?
A: If the email notification is missing, first check your Spam folder. Depending on your email provider, it may have mistakenly been flagged as spam. If it is not found, please email customer service at ( or call 1-800-832-2412 for assistance.
Q: How will I know they have received my eGift?
A: When the recipient clicks on their email and redeems their eGift, you will automatically receive an email notification.
Q: What if I do not receive the notification that the eGift has been redeemed?
A: If the email notification is missing, first check your Spam folder. Depending on your email provider, it may have mistakenly been flagged as spam. If it is not found, please email customer service at ( or call customer service at 1-800-832-2412 for assistance.
Q: I don't want to send downloads. How do I gift DVDs or CDs?
A: eGifting only covers digital products. To purchase a DVD or CD version of a course and mail it to a friend, please call customer service at 1-800-832-2412 for assistance.
Q: Oops! The recipient already owns the course I gifted. What now?
A: Great minds think alike! We can exchange the eGifted course for another course of equal value. Please call customer service at 1-800-832-2412 for assistance.
Q: Can I update or change my email address?
A: Yes, you can. Go to My Account to change your email address.
Q: Can I select a date in the future to send my eGift?
A: Sorry, this feature is not available yet. We are working on adding it in the future.
Q: What if the email associated with eGift is not for my regular Great Course account?
A: Please please email customer service at ( or call our customer service team at 1-800-832-2412 for assistance. They have the ability to update the email address so you can put in your correct account.
Q: When purchasing a gift for someone, why do I have to create an account?
A: This is done for two reasons. One is so you can track the purchase of the order in your ‘order history’ section as well as being able to let our customer service team track your purchase and the person who received it if the need arises.
Q: Can I return or Exchange a gift after I purchase it?
A: Because the gift is sent immediately, it cannot be returned or exchanged by the person giving the gift. The recipient can exchange the gift for another course of equal or lesser value, or pay the difference on a more expensive item

Priority Code


Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Course No. 9523
Professor Paul Rosenzweig,
The George Washington University Law School
Share This Course
4.6 out of 5
61 Reviews
91% of reviewers would recommend this series
Course No. 9523
  • Audio or Video?
  • You should buy audio if you would enjoy the convenience of experiencing this course while driving, exercising, etc. While the video does contain visual elements, the professor presents the material in an engaging and clear manner, so the visuals are not necessary to understand the concepts. Additionally, the audio audience may refer to the accompanying course guidebook for names, works, and examples that are cited throughout the course.
  • You should buy video if you prefer learning visually and wish to take advantage of the visual elements featured in this course. The video version contains hundreds of helpful visual elements to represent the intangible concepts of cyberspace. The graphics, video clips, and illustrated text help to illuminate how different cyber attacks work, the scope of the global cyber domain, and interesting ways to look at some of the big issues facing cybersecurity, while 3-D maps help you pinpoint where threats are emerging around the world. Specially commissioned animations also take you through a range of concepts and detailed infographics that help you visualize complex systems and cyber attacks.
Streaming Included Free

Course Overview

Cyberspace is the 21st century's greatest engine of change. And it's everywhere. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Which makes keeping these systems safe from threat one of the most pressing problems we face.

There are billions of Internet users connected to one another, and every minute, these parties create mind-boggling amounts of new information and data. Yet because cyberspace is so vast, flexible, and unregulated (and because it grows in leaps and bounds every year), all these users are highly vulnerable to dangers from cyber criminals, rogue nation-states, and other outside forces.

Just how important an issue is cybersecurity? Consider these points:

  • Every minute, individuals and organizations hack multiple websites around the world.
  • Each year, experts discover millions of new pieces of malware designed to illegally tamper with computer systems.
  • Yearly, cyber crime leads to astounding global monetary losses of billions and billions of dollars.
  • In just a single year, millions of people will find themselves the victims of cyber identity fraud.

Public policymakers and technology experts agree: Cybersecurity and the issues associated with it will affect everyone on the planet in some way. That means the more you know about this hot-button topic, the better prepared you'll be to protect yourself, to weigh in on the political and ethical issues involved, and to understand new threats (and new solutions) as they emerge.

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig of The George Washington University Law School, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we're learning how to understand, manage, and reduce these dangers. Combining an expert lecturer with a fascinating topic, this course is a riveting learning experience that immerses you in the invisible world of codes, computer viruses, and digital espionage, and offers an enthralling look at the high-stakes battles of tomorrow.

Explore the Range of Cyber Threats Out There

Thinking about Cybersecurity is laid out in a clear, systematic fashion so that you never feel overwhelmed by a topic that can seem mindboggling. Professor Rosenzweig starts by giving you a solid foundation of how the Internet and cyberspace are built, why cyber systems work the way they do, and how technical experts and scientists have attempted to "map" them out.

From there, you'll take a comprehensive look at the different types of viruses and vulnerabilities infecting the cyber domain and interfering with both technology and the real aspects of life that technology supports. You'll explore an entire cyber arsenal of threats both large and small, including:

  • spiders, automated programs that crawl around the Internet and harvest personal data;
  • keystroke loggers, programs that actually capture the keystrokes entered on a computer's keyboard; and
  • advanced persistent threats, which intrude into computer systems for long periods of time and make computers vulnerable to continuous monitoring.

And those are only a few. Using case studies drawn straight from contemporary headlines, Professor Rosenzweig gives you a solid grasp of who in cyberspace is using these and other weapons - individual hackers, "hacktivists," crime syndicates, and, increasingly, large nations - and what their motivations are for doing so.

Probe Intriguing Cybersecurity Issues

While we can never completely protect cyberspace from threat, we are far from helpless. Thinking about Cybersecurity focuses on some of the high-tech methods corporations and governments are developing and using to find cyber threats, protect themselves from future attacks, track down perpetrators, and stave off the threat of all-out cyber war.

But you'll also go deeper than that. You'll examine the intricate law and policy issues involved in dealing with these threats.

  • How do government constitutions both protect civil liberties and limit the ability of people to protect themselves?
  • How should privacy be defined in a modern world where personal data can now be tracked and shared?
  • Should cyber warfare follow the same rules of armed conflict that exist on the physical battlefield, or do we need to come up with new ethics and rules?

In addition, you'll get a chance to place everything you've learned about cybersecurity in the context of everyday life. Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.

Understand, Manage, and Reduce Your Risks

Central to Thinking about Cybersecurity is Professor Rosenzweig's expertise in this relatively new field. As a former deputy assistant secretary for policy in the U.S. Department of Homeland Security, an author of noted books on cyberspace and national security, and a frequent lecturer on cybersecurity law and policy, he is the perfect guide for a journey deep into the heart of this all-important subject.

Accompanying his informative lectures are a wealth of dynamic green-screen effects, 3-D animations, and other visual tools that help you understand:

  • theoretical views of cyberspace,
  • how information spreads around the world,
  • how viruses attack computer systems, and
  • how special tools and programs block those attacks.

By actually immersing you in the cyber world, the green-screen sequences in particular make learning about cybersecurity more engaging and visually accessible than anything you could find in a textbook.

Professor Rosenzweig takes care to emphasize throughout Thinking about Cybersecurity that the situation is never hopeless, despite the seriousness of cybersecurity threats and the rapidly evolving challenges they present. "Internet openness brings risks and dangers that cannot be eliminated," he notes. "But they are risks that can be understood, managed, and reduced. By the end of this course, you'll have a greater appreciation for what governments and individuals are doing - and can do - to reduce these risks."

The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government.

Hide Full Description
18 lectures
 |  32 minutes each
  • 1
    Stuxnet—The First Cyber Guided Missile
    Your introduction to the fascinating—and fascinatingly dangerous—world of cybersecurity begins with the story of “Stuxnet.” Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which viruses and other cyber threats can manipulate the physical world. x
  • 2
    The Incredible Scope of Cyberspace
    What makes the Internet so vulnerable is its ability to connect, and to be connected to, anyone and almost anything. Here, explore how cyberspace works. You’ll learn what goes on behind the scenes of a simple Internet search, how a simple TCP/IP system functions, the five layers of connections that make up a conceptual “map” of cyberspace, and more. x
  • 3
    The Five Gateways of Internet Vulnerability
    Take a closer look at the cyber domain’s inherent vulnerability to cyber threats. Professor Rosenzweig explains the five key gateways to this vulnerability, including the Internet’s ability to destroy time and space; allow users to act in ways they can’t in the physical world; and operate without international boundaries. x
  • 4
    Of Viruses, Botnets, and Logic Bombs
    Learn about some of the most dangerous ways people can exploit the Internet’s vulnerabilities, including DDoS attacks (which flood websites with connection requests), “Trojans” (malware hidden inside an innocent piece of information), and “botnets” (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture these threats. x
  • 5
    The Problem of Identity on the Network
    Identification is perhaps the single most profound challenge for cybersecurity today. In this lecture, delve into the question of network anonymity and identity. Who maintains domain names? How can people obscure their identities for malicious purposes? How are network designers fighting back against this threat? What are the ethical problems involved in this issue? x
  • 6
    Cyber Fraud, Theft, and Organized Crime
    Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You’ll encounter crimes that mimic real-world ones (with a computer as the “weapon”) and “computer crimes” that are only possible in the cyber world. Then, find out how law enforcement authorities are fighting back against organized, international cyber criminals. x
  • 7
    Hacktivists and Insurgency
    Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. In this lecture, learn to identify and distinguish the “good guys” from the “bad guys” by exploring real-world examples that illustrate the three major types of hacktivists: political activists, cyber insurgents, and mischief makers. x
  • 8
    Nations at Cyber War
    Turn now to the highest level of cyber conflict: a cyber war between nation-states. What is meant by the term “cyber war”? How does one fight a battle in cyberspace? What do the enemies look like? Do traditional international rules of armed conflict apply? How do we counter such an attack—and should we? x
  • 9
    Government Regulation of Cyberspace
    Join the debate about government regulation of cyberspace with this lecture that considers both sides of the issue. By looking at the debate in America over government oversight of cybersecurity (and whether we even need it at all), you’ll be better informed about a topic that has serious ramifications for how you use the Internet. x
  • 10
    International Governance and the Internet
    Continue exploring rules and regulations about the Internet, this time on the international level. First, Professor Rosenzweig discusses existing Internet governance and the dynamics leading to change. Then, he assesses some of the barriers to effective international governance of the Internet. Is the current structure, with all of its flaws, better than the alternatives? x
  • 11
    The Constitution and Cyberspace
    Return to American policies on cybersecurity, this time focusing on the idea of government monitoring of the Internet. Start by learning all about how on-network monitoring systems work. After that, step back and examine how government monitoring is enforced and limited—but not prohibited—by the Constitution. x
  • 12
    Big Data—“They” Know Everything about You
    In the first of two lectures on personal data tracking and privacy, ponder the problem of “Big Data”—where your Internet searches can be tracked, your cellphone can broadcast your geographical location instantly, and your online purchases can be catalogued. It’s a frightening aspect of cybersecurity, and one that, unfortunately, is here to stay. x
  • 13
    Privacy for the Cyber Age
    It appears our current conceptions of privacy in cyberspace will disappear. So what can we do about it? By exploring how the government and private sector use “Big Data”—and how “Big Data” can keep the government honest—you’ll discover insights into how we can evolve our privacy laws while embracing new technologies. x
  • 14
    Listening In and Going Dark
    Learn how encryption and wiretapping work in cyberspace, and how both methods are becoming increasingly frustrating for law enforcement and national security officials. This “going dark” phenomenon, as you’ll find in this eye-opening discussion, brings benefits and causes problems—and the solutions seem to bring problems of their own. x
  • 15
    The Devil in the Chips—Hardware Failures
    Hardware-based threats are one of the most vexing problems in the entire cybersecurity domain. How do we know that our machines will actually do what we tell them to do? Why is compromised hardware such a critical threat to cybersecurity? What are some possible solutions for dangers hidden in computer chips? x
  • 16
    Protecting Yourself in Cyberspace
    Get practical tips on how to reduce your own risk of danger online in your professional and personal life. You’ll find out how to choose the most effective passwords, how to set up the most effective personal computer security systems, how to encrypt and erase personal data and documents, and much more. x
  • 17
    Critical Infrastructure and Resiliency
    Take an alternate approach to cybersecurity, this time focusing on resiliency and recovery. There may be good reason to think that creating a system that isn’t immune to failure but is less likely to be attacked—and better able to operate even while under attack—is the best course of action. x
  • 18
    Looking Forward—What Does the Future Hold?
    Finish the course with a helpful summary of the main issues and arguments involved in the current state of cybersecurity throughout the world. Then, take an intriguing peek into the future to explore possible—and even radical—new developments that may shape this powerful and important topic for years to come. x

Lecture Titles

Clone Content from Your Professor tab

What's Included

What Does Each Format Include?

Video DVD
Video Download Includes:
  • Ability to download 18 video lectures from your digital library
  • Downloadable PDF of the course guidebook
  • FREE video streaming of the course from our website and mobile apps
Video DVD
Audio Download Includes:
  • Ability to download 18 audio lectures from your digital library
  • Downloadable PDF of the course guidebook
  • FREE audio streaming of the course from our website and mobile apps
Video DVD
DVD Includes:
  • 18 lectures on 3 DVDs
  • 160-page printed course guidebook
  • Downloadable PDF of the course guidebook
  • FREE video streaming of the course from our website and mobile apps
Video DVD
CD Includes:
  • 18 lectures on 18 CDs
  • 160-page printed course guidebook
  • Downloadable PDF of the course guidebook
  • FREE audio streaming of the course from our website and mobile apps

What Does The Course Guidebook Include?

Video DVD
Course Guidebook Details:
  • 160-page printed course guidebook
  • Photos & illustrations
  • Suggested readings
  • Questions to consider

Enjoy This Course On-the-Go with Our Mobile Apps!*

  • App store App store iPhone + iPad
  • Google Play Google Play Android Devices
  • Kindle Fire Kindle Fire Kindle Fire Tablet + Firephone
*Courses can be streamed from anywhere you have an internet connection. Standard carrier data rates may apply in areas that do not have wifi connections pursuant to your carrier contract.

Your professor

Paul Rosenzweig

About Your Professor

Paul Rosenzweig
The George Washington University Law School
Paul Rosenzweig is a Professorial Lecturer in Law at The George Washington University Law School in Washington, D.C., where he lectures on cybersecurity law and policy. He also serves as Adjunct Professor in the Near East South Asian Center for Strategic Studies at the National Defense University. Professor Rosenzweig is a cum laude graduate of The University of Chicago Law School. In his nonacademic endeavors, Professor...
Learn More About This Professor
Also By This Professor


Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is rated 4.6 out of 5 by 61.
Rated 3 out of 5 by from Didn't get a chance to view the second of 3 DVDs. The 2nd DVD was cracked around the hole used to secure the DVD to the jewel case. Unfortunately, I already knew most of the stuff he talked about.
Date published: 2016-12-22
Rated 5 out of 5 by from The best education With cyber security in the news, this course taught me a lot. The ABCs of the Internet., it's ease of use and thus its vulnerability, the ways one can take to be secure were all fully explained. I will listen to this course again and ask my friends to purchase and listen.
Date published: 2016-12-06
Rated 5 out of 5 by from Fascinating, frightened, and extremely well done. Excellent course. Lots of information which gave me a new way of seeing the cyber-world. It is frightening how subject we are to anyone who wants information about us to get it. Also, the amount of anonymity for any people who want to harm us. This is a course everyone needs to listen to.
Date published: 2016-11-27
Rated 5 out of 5 by from Protocol Definition Error In Lecture 5 Professor Rosenzweig refers to http:// as "http:backslash backslash" at time points 1:23 & 1:46. This is incorrect. It should be "http:slash slash". This mistake was common with reporters in the early days of the internet, but even there it was corrected many years ago.
Date published: 2016-10-29
Rated 5 out of 5 by from Great course although beginning to be a bit dated A truly outstanding course. The professor's presentation is smooth and very professional. My only issues are the irritating "beep" that continually occurs when text pops up on the screen (whoever thought that would be a good idea should be fired) and perhaps more significant, the course is 4 years out of date and so much has happened in the cyber-security area in the last 4 years. That being said, it is still a worthwhile investment when on sale.
Date published: 2016-10-15
Rated 5 out of 5 by from Well worth having This course presented many excellent points that covered the entire spectrum of cybersecurity for those of us who are not IT professionals. One of the presentations in particular was worth the cost of the entire course.
Date published: 2016-10-02
Rated 5 out of 5 by from This Was a Pretty Good Course I thought this was a pretty good course. I don't remember why I bought it, but I listened to the entire thing and I found it both informative and interesting. If someone had a lot of background in IT or in Computer Science, I can see how such a person might find this course a bit basic, but I don't know a thing about the Cyber world, so I ended up learning a lot. I bet a lot of people in my age demographic are in a similar position. I'm nearly 240 years old and I just started using the Internet. After this course, I'm using it much more intelligently. I was a bit surprised in lecture 11 when the Professor started using some very vulgar profanity. Then I realized it was actually my neighbor screaming at his award-winning flower beds and not the Professor. So, if you are concerned about the Professor using all sorts of "R-rated" words, don't be. My grandmother could listen to this. In fact, she did listen to it and then she hacked my computer to "teach me a lesson". She also liked the course, though. I listened to the audio version on this and found it more than adequate. I don't know what I would have gained if I had a video version....besides a splitting headache from the light of my computer screen. Overall, a very good course. The Professor's voice is clear and articulate and easy to listen to (unlike my neighbor -- see above). Also, the Professor had some very intriguing things to say about how and why authoritarian regimes might really like Cloud computing. I was very interested about encryption as well and why quantum computing might render supposedly un-breakable encryption a joke. I recommend this course and when I scrape together a few more bucks, I might by the other course buy this same Professor.
Date published: 2016-09-24
Rated 4 out of 5 by from
Date published: 2016-08-17
Rated 4 out of 5 by from
Date published: 2016-05-30
Rated 5 out of 5 by from Frightening... i came away with an excellent overview of the Cyber-Security elements,both currently, and historically. All of it excellently presented by the Professor. Unfortunately, I have had this course in my library for a long time, and have just now gotten around to completing it, in addition to absorbing the wrote material, I came away with the impression that the future of Cyber-Security is anyones game. Although we are running to stay ahead, those that would do us harm are working just as hard. This story doesn't end well...
Date published: 2016-05-10
Rated 5 out of 5 by from Excellent course on Cyber Security I would like to thank Professor Rosenweig for this effort. This course will help anyone interested in understanding how to use, and how some people abuse, the Internet. Professor Rosenweig explains issues pertaining to Cyber Security in a clear, and concise manner. I liked this course so much I just purchased his Surveillance State course. Oh, and one more thing, I have over twenty years experience in computer, network, and cyber security. And I still found this course beneficial!! I do not believe there is a college or university in this country that offers a class on this subject for less than The Great Courses price. Thanks also to The Great Courses for offering such interesting topics.
Date published: 2016-03-24
Rated 4 out of 5 by from Great Courses in General My fundamental problem with Great Courses is their superficiality. Those in our group who are watching these courses have post-graduate education. We have viewed about five of the courses that deal with mathematics and physics and find them lacking sufficient depth to get any more than a very casual understanding of the topics,
Date published: 2016-02-11
Rated 5 out of 5 by from
Date published: 2016-01-28
Rated 5 out of 5 by from
Date published: 2016-01-26
Rated 4 out of 5 by from If you use the internet you should listen to this An excellent course. Everyone who uses the internet should take this course to understand the vulnerabilities that exist in cyber space today and the responses available. Pluses: • The professor covered the following material well: o How the five gateways of internet vulnerability result in cyber threats being drastically different from traditional threats/war o Descriptions of the various types of threats (including DDoS, Botnets, financial/intellectual theft, espionage, war acts such as the disruption of the electrical grid or shutting down a uranium enrichment facility, and hardware-based threats) o Descriptions of the malicious actors in cyberspace (including petty criminals, organized crime, hacktivists, and nation states) o The legal ramifications of violating a “terms of service” you accept when you sign up for a service on the internet o The debate on whether the government should provide oversight of cyber security on the internet as a whole and, if so, how much? Can policies keep up with the pace of technological advances? o The debate on whether the government should monitor internet usage for national security reasons and, if so, to what degree? o The debate on the definition of privacy in this new age: Do our existing privacy laws need to be revised and updated to reflect technological advances? • The professor provided both sides of an argument or case for the controversy topics such as privacy protection and government policy on cyber security controls and gave his own views • The professor kept the technical minutia to a minimum making it easy to follow the technological discussions One minus: • I found myself hoping the professor would’ve provided a few more examples (whether real life use cases or theoretic possibilities) when explaining certain topics (such as hardware threats)
Date published: 2015-11-29
Rated 5 out of 5 by from scary stuff but well worth the money I bought this course to complement a MOOC on cybersecurity that work had encouraged me to do. This was a lot more useful than the MOOC. In fact I recommended it to our new security manager. Although now a couple of years old the content is still extremely relevant ( I'm writing this towards the end 2015). There are a couple of sessions which are focussed on American legislation but their content is still useful for those living outside America as it gives a benchmark with which to compare the local legislation / proposals.
Date published: 2015-11-27
Rated 5 out of 5 by from Great Information Relevant to Today's World This course is rich in valuable information about today's world of cyberspace and the dangers it contains. With the knowledge gained in this course, I am able to protect my identity and data as well as understand the complexity and risks of the current technological world we live in. Expert discussions about cyber security on the news will be much easier to comprehend.
Date published: 2015-10-28
Rated 1 out of 5 by from Asking the right questions! " The critical point here is asking the right questions" This course was going well till lecture 13. Then he goes over the top with the 9/11 official conspiracy theory fear mongering. " oh if we only connected the dots." I should of known from the start when the intro was bragging about the professors connections with James Chertoff. I tried to listen for the content alone; however, I could not stomach chapter 13. A warning to all who are not third eye blind it will be excruciating to listen to for content alone. He does make intresting points then he blows credibility with this 9/11 nonsense.
Date published: 2015-07-26
Rated 5 out of 5 by from Very Informative This was an easy course to watch and I found it very informative. Many of the topics I was completely unaware of. It certainly made the computer security course I took in college 25+ years ago seem laughable now.
Date published: 2015-04-13
Rated 5 out of 5 by from A Very Important Course This is an excellent course, very well constructed and presented. Dr. Rosenzweig is extremely knowledgeable on the subject. He is blunt without being alarmist. One is left not only better informed about the current state of cyber security (insecurity might be more apt) but also wondering what the future holds for the internet. The governmental, commercial, and personal risks in using it are becoming so high that one wonders if it can survive in its present form. However, as Professor Rosenzweig points out, it is so deeply imbedded in all aspects of modern life that it seems irreplaceable. As implied in the title, this course is concerned with matters of security at various levels from threats to the nation’s classified information and infrastructure, through theft and destruction of commercial secrets, to fraud, theft, and malicious acts against individuals. The professor also discusses the issue of privacy. The lectures are enlivened by real-life examples and cover the technical aspects of the architecture of the internet that make it so susceptible to misuse. He also discusses the legal and foreign policy issues that are raised by potential attacks and responses. Professor Rosenzweig demonstrates very clearly the vulnerabilities that are inherent in the use of the internet and their origin in the philosophy that was built into its architecture. He describes and illustrates five sources of vulnerability: The instantaneous global reach that is available to persons of malicious intent; the disproportionate effect that an individual or group can achieve with low cost and low technology; the extreme difficulty of identifying the source of a malicious action; the practical impossibility for a nation to protect its borders against incoming malicious material on the internet; and the extreme difficulty of distinguishing malicious software from useful or harmless code. When one recognizes our dependence on the internet for our commerce, governmental business (including defense), and the operation of our infrastructures such as power generation and banking, Professor Rosenzweig’s vulnerabilities become very alarming, indeed. Even more alarming is the fact, clearly recognized by Professor Rosenzweig, that the defensive strategies are very limited and ineffective. So much so that the professor recommends a strategy of resilience - rapid recovery from damage - for our critical infrastructure This is a very important course on a subject about which everyone should become knowledgeable: Its future development will affect us all.
Date published: 2015-04-11
Rated 5 out of 5 by from Difficult subject made comprehensible Security of the internet, along with its problems (spam, hacking, attacks on government and corporate sites) has long intrigued me. How could this happen? Why can't these problems simply be fixed? Prof. Rosenzweig gives a good, understandable introduction to (1) how the internet operates and (2) how criminals and amateurs alike use that technology to their advantage. Beyond the mechanics he also discusses the broader issues that should concern us -- privacy rights, governmental monitoring, and the relentless collection of data on each of us (an average of 1,500 documents per person). The speaker addresses each issue clearly and thoroughly. Very interesting topic and very well done.
Date published: 2015-03-27
Rated 4 out of 5 by from Very informative and thought provoking course I found this course to be timely and highly relevant to the cyber threat mosaic that exists today. It is a call to action for those of us who are charged with protecting critical data. The keen insight and broad expanse of risk identification was noteworthy.
Date published: 2015-03-22
Rated 5 out of 5 by from Couldn't have been better! I have bought and listened to quite a number of courses and have found most of them to be quite good. Sometimes better than others, most courses have met my expectations. Then I began listening to this course on Cyber Security - and I was very pleased. The presenter is great to listen to, the course is extremely well organized, and all of what I wanted to hear about and understand was offered here. And I am someone who spent over 25 years in the data processing industry - and still am quite actively engaged in IT and the internet. This is literally the best course i have ever had from The Great Courses. Thanks!
Date published: 2015-03-13
Rated 5 out of 5 by from Shows What the Internet Really Can Be Most people who use the Internet, which is almost everyone, clicks and goes everywhere with very little thought as to what is actually happening. Working in this field still I had my eyes opened wide as I went through the courses. Paul is an expert on his topic and some of the questions he asks you to consider actually make you stop and think. The final point is that the Internet is a great invention, should be kept free but, it has to be treated with respect. You have a deeper appreciation and sense of care after watching this series. I would highly recommend this to anyone who uses the Internet for anything. This would be good for kids also to watch as it will give them a sense of what they are clicking they way around and more importantly what is really out there.
Date published: 2015-03-07
Rated 5 out of 5 by from
Date published: 2015-02-06
Rated 4 out of 5 by from Fair introduction This is a fair introduction to the issues. If you are not technically inclined, and have never taken and never intend to take any computer science or security classes, this is for you. If you already have a basic understanding, this is not for you.
Date published: 2015-01-20
Rated 5 out of 5 by from AS RELEVANT AS TOMORROW'S NEWSPAPER!!! Extremely timely and critical presentation. I could not put it down! I thought I knew computers and cyber security issues before I watched this course. I now realize how much I still needed to learn! I strongly recommend this to anyone who has an interest in the subject.
Date published: 2015-01-04
Rated 5 out of 5 by from Cybersecurity (Baseline and Path forward) Prof Rosenzweig has covered a lot of ground in this course and he have done a great job. Course engages the listener really well. I highly recommend this class for everyone who does transaction on internet (Banking, Tax, trading, emails etc.) and keeps their info on local computer or in cloud. Information highway was created for exchanging the info and now its fabric of everything we do in our daily life. It is clear that everyone has a play a role in protecting the information and need to be aware that cyber war is real thing and its just getting started and their is a lot to be done to secure our interest by protecting our intellectual properties and business know hows.
Date published: 2015-01-04
Rated 5 out of 5 by from Cyber Security Knowledge! I've learned a tremendous amount from Mr. Rosenzweig. The material is well presented and current.
Date published: 2014-12-28
Rated 5 out of 5 by from Great strategic view This course was a great overview of the cybersecurity field. I ordered this course to decide if the cybersecurity realm was the right choice for me when going back to school. The overviews and information presented in this program were highly informative. I decided to go back for a degree in cybersecurity and am currently 1/4 of the way through. I would recommend this course to anyone to raise awareness, but I would strongly recommend this course for anybody looking into any IT field for a career. The realm of cybersecurity touches nearly every other field and Paul Rosenweig does a fantastic job presenting that. From his first lecture of Stuxnet to his discussion of "big data," each lecture provides very good perspective.
Date published: 2014-12-09
  • y_2017, m_3, d_20, h_23
  • bvseo_bulk, prod_bvrr, vn_bulk_1.0.0
  • cp_2, bvpage2n
  • co_hasreviews, tv_6, tr_55
  • loc_en_US, sid_9523, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING)]
  • clientName_teachco
  • bvseo_sdk, p_sdk, 3.2.0
  • CLOUD, getContent, 26.48ms

Questions & Answers


1-10 of 11 Questions
1-10 of Questions

Customers Who Bought This Course Also Bought

Buy together as a Set
Save Up To $13.00
Choose a Set Format
Video title