Priority Codes are on the back of the catalog, mail promotion, or within an advertisement. To ensure that the pricing on the website is the same as what is in your catalog or advertisement, please enter the priority code provided.
The Hack Attack with Professor Paul Rosenzweig
Examine the high-tech methods corporations and governments are developing and using to find cyber threats, protect themselves from future attacks, track down perpetrators, and stave off the threat of all-out cyber war. Join Great Courses professor Dr. Paul Rosenzweig on March 23, at 6:00 PM ET for a thrilling chat.

3rd & 7 37yd
3rd & 7 37yd
B
S
O
close
close

-





-
-
Thank you, professor! I look forward to hearing from you again!
-
-
-
Thanks everyone for joining me in this chat. I enjoyed engaging with you on these important topics. As we mentioned during the chat, there are two events I am doing in the Washington DC area over the next couple of weeks – one tomorrow at George Washington University on Apple v. FBI (12-2 PM) and another on March 30 at The Heritage Foundation on the Role of Intelligence (830 AM – 1 PM). If any of you happen to be there, please introduce yourselves as Great Courses participants so I can say hello.
-
Thank you so much for joining us today. A special thank you goes out to Professor Rosenzweig for taking the time and providing us with such insightful answers to your questions. We would love your feedback on the chat this evening- please let us know how we did on Facebook.com/thegreatcourses and we hope you will join us for future chats with our Great Courses instructors.
-
Tune in on April 6th for our next chat with Professor Gimbel, right here at live.thegreatcourses.com
-
Is there any way 'someone' can view a computer user through the little window used for Skye?
-
Has the emphasis on CYBER served to diminish the value of HUMINT (human intelligence) in the Security Battle? May humint personnel are concerned about legal liabilities in the performance of that line of work.
-
I think cash is good in the right hands. Why should a good person need to be tracked?
However, my dad got tricked by a criminal. The criminal used PayPal to see if he could steal my dad's watch. He sent a fake deposit email and asked for the watch to be sent before it would be released. My dad almost fell for it. How can we best tell if the email or payment is a fraud? -
Professor, do you plan to release more lectures?
-
When it comes to hacking, my friends are worried. How can we protect our personal data, such as on a laptop? I have heard of covering the camera, but I don't want to just because of some fear. Can you help my friends and I?
-
Professor, what is your favorite topic when it comes to cyber threats, espionage, and etc.?
-
Professor, if there were to be a cyber war - what would be our greatest threat?
-
Recently, a hospital in southern California was hacked. The criminal(s) demanded payment of $17K in Bitcoins as ransom. I expect the medical industry to get serious about hardening their cybersecurity as a result, build high walls so the cybercriminals look elsewhere. At present, which industries do you think are too lax about cybersecurity?
-
Hello Dr Rosenzweig, I watched both your courses. Excellent. During the cyber security course you mentioned that some people were working on an alternate security based internet -- dot.security -- but that it wasn't likely to get much traction. Do you think a secure internet for machine to machine communications, a secure internet for the Internet of Things, could develop more easily than the current human to human internet?
-
@bsa @MichaelF.StrobelProf,... @Perez In the latest Apple vs Gov. doesn't the judicial safeguards protect Apple, especially from foreign gov. requests to provide help??
-
Dr. Rosenweig, this question is to help people who are interested in a career in Cybersecurity. Could you please name some of the must-have IT skills sets, in addition to college educations, that you know employers are looking for when hiring a cybersecurity specialist?
-
High tech. surveillance is not an alternative of human surveillance. whats your opinion and why fail HTS in terrorism.
-
I would like your perspective on cybersecurity when it comes to the Internet of Things.
-
I see many interesting questions tonight, professor, it seems that I am not the only one concerned with online security.
-
How important is file or hard drive encryption to prevent cyber attacks?
-
How does the individual follow cyber attacks and hot to prevent a personal attack
-
I think I read my 55" Samsumg smart TV has 1 mb of "memory." Both when I watch Comcast TV, but also when I hook up my internet to make it a giant screen, what is likely to be information passed on to Comcast or other. Anything? A lot?
-
In your "Thinking about Cybersecurity" course you discussed hardware threats. Can you expound on what that may actually mean or provide examples? Thank you.
-
We work with federal civilian agencies with tools to monitor public social media sites such as Twitter or Facebook and others including blogs. We've actually found a reticence from the agencies engage in this monitoring for fear of being perceived as "Big Brother". Is there an acceptable level of Big Brother monitoring?
-
Has the "security" part of cyber security gotten any better since you recorded those lectures?
-
Are android phones as secure as iphones as far as encryption is concerned?
-
Have the recent attacks in Europe heated up the alternate views on encryption and government backdoor access?
-
How did the "ENEMY" get so far ahead of us in encryption capabilities, and how long do you think it will take us to catch up with them?
-
Are you familiar with Start Page or Ixquick used for searches as well as for em, etc? It was founded to be a 'safe' place.
