Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Course Overview
Explore 18 essential cybersecurity lectures with expert Paul Rosenzweig, covering threats from identity theft to cyber warfare and practical personal protection strategies.
Video Lessons
Cyber Threats
- Stuxnet Cyber Attack (32 min)
How malware physically damaged Iran’s nuclear facility - Viruses & Botnets (32 min)
DDoS attacks, Trojans, and defense mechanisms - Cyber Fraud (31 min)
Organized crime tactics and law enforcement responses
Cyber Conflict
- Hacktivism (31 min)
Political activists vs cyber insurgents - Nation-State Cyber Wars (33 min)
Rules of engagement in digital warfare
Governance & Privacy
9-11. Regulation Challenges (100 min)
- US policy debates
- International governance
- Constitutional monitoring limits
12-13. Data Privacy (65 min)
Big Data tracking and privacy evolution
Protection Strategies
- Encryption Battles (34 min)
Law enforcement vs privacy technologies - Personal Security (31 min)
Password best practices and data encryption
Future Security
- Resilient Systems (32 min)
Critical infrastructure protection - Cyber Future (36 min)
Emerging threats and radical solutions

