S:1 E:4
Of Viruses, Botnets, and Logic Bombs
Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks...
S:1 E:4
Design for Light, Water, and Microclimate
Visit a small-space garden and investigate methods for solving common planting problems for stubborn areas such as...
S:1 E:3
The Five Gateways of Internet Vulnerability
Take a closer look at the cyber domain's inherent vulnerability to cyber threats. Professor Rosenzweig explains the...
S:1 E:25
Borobudur-Ancient Buddhist Stupa
Continue your investigation of Buddhism by turning to the largest Buddhist monument in the world, Borobudur. As you study the...
S:1 E:18
Looking Forward-What Does the Future Hold?
Finish the course with a helpful summary of the main issues and arguments involved in the current...
S:1 E:6
Cyber Fraud, Theft, and Organized Crime
Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity...
S:1 E:10
International Governance and the Internet
Continue exploring rules and regulations about the Internet, this time on the international level. First, Professor Rosenzweig discusses...