Introduction to Cyber Security
The world of interconnected computing devices surrounds us today and will continue to influence almost everything in our lives. The blood of computer networks are small packets of data that behave by means of the TCP/IP protocol. Initially TCP/IP wasn't designed with security in mind and only after vulnerabilities were discovered did the field of computer security develop. The term €œcyber could be used for many things but today it is accepted as any information in a digital data form. Hence Cyber Security is about protecting that digital data from the many dangers that can destroy it. In this course students will learn about data protection and risk. We will discuss threats to computer systems and defensive strategies. Students will gain knowledge of protocols and how they work as well as the tools to measure them. Additionally, Cyber Security best practices will be shared.
Meet the Subject Matter Expert
As chief consultant for InterNetwork Service, an Information, Communications and Security services company, Tom is responsible for daily support of the IT security infrastructure for many Philadelphia based firms. Tom regularly maintains back office support for many of today's cutting edge technology issues along with security evaluations, vulnerability assessments and penetration tests. Tom is also an IT security trainer for a number of training organizations and has delivered security training around the globe including USA, EU, China and India. He has presented seminars at both Riverbed's Sharkfest and EC-Councils Hacker Halted conferences and regularly delivers webinars on security related subjects.