Computers and the Internet, smartphones and apps have pervaded our daily lives. Working without computers is hardly imaginable; we go shopping on the Internet and order a taxi with a smartphone app. The ongoing digital transformation will reinforce this even more. The digitization of our personal lives, companies, and industries exposes many new opportunities and can add comfort to our daily routines. However, network connections to homes, businesses, and industrial facilities and virtual controls not only allow access to legitimate users, but are also zones for malicious forces to attack. This course illustrates how our world has become more and more digitized and highlights the unfamiliar threats that lurk in the shadows of the bright new digital age.
Computers and the Internet, smartphones and apps have pervaded our daily lives, professionally as well as privately. Working without computers is hardly imaginable; we go shopping on the Internet and order a taxi or pizza with our smartphone. The ongoing digital transformation will reinforce this even more, mirroring an increasing number of physical entities in cyberspace. Your fridge will order milk when you run low, your house will turn down the heating when you’re not at home, your washing machine will run automatically when electricity rates are lowest.
The digitization of our personal lives, companies, and industries exposes many new opportunities and can streamline and add comfort to our daily routines. However, every coin has two sides. Network connections to homes, businesses, and industrial facilities and virtual controls not only allow access to legitimate users, but also pose a threat as zones for malicious forces to attack. This course illustrates how our world has become more and more digitized and highlights the unfamiliar threats that lurk in the shadows of the bright new digital age.
Here’s what participants are saying about this course:
Aditya J ( I Like, I Wish) :
This course does a great job in explaining why cybersecurity is required, and the consequences of neglecting it. This is probably one of the few courses which cover cybersecurity from the different points of view such as that of an end user, an organization and process automation in an industry.Eagerly awaiting the next course in the Thought Leaders series. Keep up the good work.
Mohamed Yosufdeen JMH (I Like, I Wish):
I like the way in which this course is structured, it is designed in such a way that there will not be any difficulty in understanding the concepts. (It starts from the very basic, and increases the technicality as required). I wish that this course should reach every individual, be it a student or a professional, so that they know what exactly are happening and the security issues in cyber world.
This course is hosted by openSAP but the content is created and provided to you by Hasso Plattner Institute Potsdam,*
There are no formal requirements for this course.
*SAP accepts no responsibility for the content delivered in this course.
Find out more in the certificate guidelines.
Prof. Dr. Christoph Meinel is scientific institute director and CEO of the Hasso Plattner Institute, where he heads the department for Internet Technologies and Systems. He lectures in IT systems engineering, supervises numerous doctoral projects, and is a teacher at the HPI School of Design Thinking. His research interests lie in security engineering, knowledge engineering, and Web 3.0. In addition to this, he is also academically involved in the area of design thinking.
Prof. Meinel is the (co-)author of 15 books and more than 500 publications in academic journals, a member of acatech, visiting professor at the Beijing University of Technology, and holds positions on many scientific boards and governing bodies.