Curso al ritmo de cada uno

Confidential Communication in the Internet

Impartido por Prof. Dr. Christoph Meinel

An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.

A message on the Internet is sent through several networks and via different stations on its way to the target system. The individual stations are responsible for ensuring that the message is properly forwarded and finally delivered to the correct recipient. Each of these stations, if the message is sent in plain text, can receive the message and read its content. This means that a potential attacker, if he controls one of these intermediate systems, can also read the content of the message and even modify it before retransmitting it. Such attacks can have extreme effects on communication.

In this course we will look at how and whether your connection to online banking is secure or whether the content of an e-mail is trustworthy. For this purpose we will deal with the basics of cryptography, security objectives and different types of encryption. In addition, we will provide insights into different models and standards that are used in practice.

Desde febrero 2, 2022 en modo autodidacta
Idioma: English
Beginner, Cybersecurity

Información del curso

A message on the Internet is sent through several networks and via different stations on its way to the target system. The individual stations are responsible for ensuring that the message is properly forwarded and finally delivered to the correct recipient. Each of these stations, if the message is sent in plain text, can receive the message and read its content. This means that a potential attacker, if he controls one of these intermediate systems, can also read the content of the message and even modify it before retransmitting it. Such attacks can have an extreme impact on communication, as information is no longer confidential and the credibility of the message can no longer be established.

For this reason, encryption procedures are used to ensure that the content of messages can only be interpreted by the sender and the recipient. This ensures that the information remains confidential. Furthermore, there are procedures that can be used to detect whether there has been a change in the information in a message. These security procedures are currently in widespread use and are used in particular for sensitive services such as online banking.

In this course we will look at how and whether your connection to online banking is secure or whether the content of an e-mail is trustworthy. For this we will deal with the basics of cryptography, security objectives and different types of encryption. In addition, we will provide insights into different models and standards that are used in practice.

Take the cybersecurity exam and get a qualified certificate!

This course content is part of the cybersecurity series on openHPI. The series consists of three courses and ends with the Cybersecurity exam in September 2022. By the Cybersecurity exam, you have the chance to receive a free record of achievement or a qualified certificate. Therefore, please attend the three courses Confidential Communication in the Internet, Digital Identities, and Cyberthreats by Malware and finish them with a confirmation of participation. This allows you to register for the cybersecurity exam which covers questions from all three courses.

Contents:

  • Introduction
  • Safety objectives
  • Cryptography
  • Cryptoprotocols & Attacks
  • Certificates and Trust Center
  • Encryption
  • Signatures
  • Technical digressions (AES, hash functions, ...)

Key data on the course

  • Required skills: general IT knowledge, solid mathematical knowledge
  • Course level: Basics, but courses also go into depth
  • Target group: Everyone interested in encryption methods and digital signatures
  • Effort: 3-6 hours per course week (optional: 2 hours for the Cybersecurity Basics - Exam)

Follow us on Twitter: @openHPI. For tweets about this course please use the hashtag #confidentialcommunication2022
Visit us on Facebook: https://www.facebook.com/OpenHPI

More video lectures can be found at www.tele-task.de.

Reactivar este curso

Puede acceder a todos los trabajos evaluados y obtener un certificado de estudios con la opción de reactivación del curso. Obtenga más información o

Matricularme en este curso

El curso es gratuito. Solo tiene que crear una cuenta en openHPI ¡y ya puede hacer el curso!
Matricularme ahora

Learners

Current
Today
7.182
Course End
feb 02, 2022
4.088
Course Start
ene 19, 2022
3.243

Valoración

Este curso se ha valorado con 4.44 estrellas de media a partir de 41 votos.

Requisitos para el certificado

  • Obtenga un certificado de estudios al obtener más del 50% del número máximo de puntos de todos los trabajos evaluados.
  • Obtenga una confirmación de participación al completar al menos el 80% del material del curso.
  • Obtenga una insignia digitale abierta al completar el curso.

Para saber más, consulte la guía de certificados.

Curso impartido por

Prof. Dr. Christoph Meinel

Christoph Meinel (Univ.-Prof., Dr.rer.nat., Dr.sc.nat., 1954) was Managing and Scientific Director of the Hasso Plattner Institute for Digital Engineering gGmbH (HPI) until March 2023. He is a full professor (C4) for Informatics at the university of Potsdam and has the chair for "Internet Technology and Systems" at the HPI. From 2017 to 2021 he was the founding dean of the Digital Engineering Faculty of the University of Potsdam.
His research interests are broadly diversified in the area of innovative Internet applications and systems, especially in digital education, e-learning & tele-teaching, artifical intelligence and deep learing, and Internet and information security. He is also active in the field of innovation research and investigates the Stanford innovation method design thinking. Former research interest were in telemedicine, as well as in the theoretical foundations of computer science in the areas of complexity theory and efficient OBDD-based algorithms and data structures.