Курс із самостійним навчанням
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
The average Internet user has more than 25 Internet accounts, which are created for a wide variety of purposes. Besides accounts for e-mail services or social networks, users need access to learning platforms or online shopping services. Each of these internet accounts represents an individual digital identity. Each of these identities in turn contains a wide variety of personal information. In addition to information used to authenticate a user, such as an e-mail address and password, other services require very personal and sensitive data, such as bank details for payment and the place of residence for the subsequent delivery of an order.
The average Internet user has more than 25 Internet accounts, which are created for a wide variety of purposes. Besides accounts for e-mail services or social networks, users need access to learning platforms or online shopping services. Each of these internet accounts represents an individual digital identity. Each of these identities in turn contains a wide variety of personal information. In addition to information used to authenticate a user, such as an e-mail address and password, other services require very personal and sensitive data, such as bank details for payment and the place of residence for the subsequent delivery of an order.
The amount and variety of personal information that a digital identity can define provides cyber criminals with extensive opportunities for data misuse in the event of data theft. The protection of digital identities is therefore becoming increasingly important.
In this course we will look at how a digital identity is defined and what attributes such an identity can have. We will also explain which methods can be used to authenticate an identity and which techniques are available for identity management.
Another section of the workshop will look at different forms of attack on digital identities and give advice on how users can better protect their data. An important element in this context is the knowledge about secure passwords, possible attacks against passwords and secure methods for password storage.
Take the cybersecurity exam and get a qualified certificate!
This course content is part of the cybersecurity series on openHPI. The series consists of three courses and ends with the Cybersecurity exam in September 2022. By the Cybersecurity exam, you have the chance to receive a free record of achievement or a qualified certificate. Therefore, please attend the three courses Confidential Communication in the Internet, Digital Identities, and Cyberthreats by Malware and finish them with a confirmation of participation. This allows you to register for the cybersecurity exam which covers questions from all three courses.
Contents:
Required skills:
Course level:
Target group:
Effort
Follow us on Twitter: @openHPI. For tweets about this course please use the hashtag #identities2022.
Visit us on Facebook: https://www.facebook.com/OpenHPI
For more video lectures, visit www.tele-task.de.
Ви можете отримати доступ до всіх оцінюваних завдань і отримати відомість досягнень, скориставшись опцією повторної активації курсу. Детальніше або
Цей курс отримав у середньому 4.38 зірки від 8 голосів.
Для отримання додаткової інформації див. інструкцію з отримання сертифіката.
Christoph Meinel (Univ.-Prof., Dr.rer.nat., Dr.sc.nat., 1954) was Managing and Scientific Director of the Hasso Plattner Institute for Digital Engineering gGmbH (HPI) until March 2023. He is a full professor (C4) for Informatics at the university of Potsdam and has the chair for "Internet Technology and Systems" at the HPI. From 2017 to 2021 he was the founding dean of the Digital Engineering Faculty of the University of Potsdam.
His research interests are broadly diversified in the area of innovative Internet applications and systems, especially in digital education, e-learning & tele-teaching, artifical intelligence and deep learing, and Internet and information security. He is also active in the field of innovation research and investigates the Stanford innovation method design thinking. Former research interest were in telemedicine, as well as in the theoretical foundations of computer science in the areas of complexity theory and efficient OBDD-based algorithms and data structures.