YoVDO

Advanced System Security Design

Offered By: University of Colorado System via Coursera

Tags

Cybersecurity Courses Computer Networking Courses Cloud Computing Courses

Course Description

Overview

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.

Syllabus

Course 1: Cloud Computing Security
- Offered by University of Colorado System. In this MOOC, we will learn Cloud Computing basics using AWS as an example, We will guide you to ... Enroll for free.

Course 2: DDoS Attacks and Defenses
- Offered by University of Colorado System. In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and ... Enroll for free.

Course 3: Security and Privacy in TOR Network
- Offered by University of Colorado System. In this MOOC, we will learn about TOR basic concept and see how they protect the security and ... Enroll for free.

Course 4: Advanced System Security Topics
- Offered by University of Colorado System. In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management ... Enroll for free.


Courses

  • 0 reviews

    12 hours 28 minutes

    View details
    In this MOOC, we will learn Cloud Computing basics using AWS as an example, We will guide you to create AWS account, planning AWS resources for your cloud systems, create AWS EC2 instances, access them and configure the popular LAMP web services with MySQL database. We will guide you to create user accounts for your programmer or operators using AWS Identify and Access management GUI, Register your domain name and setup DNS entry for your servers using AWS Route 53 in 22 mintues! and show you how to use AWS Command Line interface to create and managing instances and services programmatically. We then introduce AWS Load balancing feature, create load balancing cluster for scalability and reliability. We also demonstrate how to diagnose the problem introduced by the health check and firewall restriction conflicts. By the end of this course, you should be able to create your own web cluster with mysql databases, setup your users with credentials to manage your AWS resources/virtual machines either through their management control interface or using AWS CLI API using scripts. You will also learn the best practice in cloud security and debugging service interaction issues may arise in the cloud systems.
  • 1 review

    15 hours 34 minutes

    View details
    In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks. For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems.
  • 0 reviews

    22 hours 10 minutes

    View details
    In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS instance. We will also learn the best practices and operational security in providing the hidden services. We will learn how to manage the hidden server using Tor circuit and configure the web server not to reveal the software version information. We also show how it can be defended. To improve TOR’s performance, we discuss the cloud based TOR and their implementation. By the end of this course, you should be able to utilize TOR browser to protect your privacy, set up hidden service on current interface that protect your servers and make it anonymous, you will choosing entry guards wisely since your adversary will try to attack them with DDoS traffic and force you to choose their relay as your entry and exit router. We will also learn the basic components of both censorship and censorship resistance systems, and the scheme deployed by these systems and their attacks.
  • 0 reviews

    15 hours 12 minutes

    View details
    In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. We show how Google Map and Web Crytpo API can be integrated for encrypted document on web browser without download apps and associate them with geolocking area to restrict unauthorize and improper accesses.

Taught by

Edward Chow, Greg Williams and Richard White

Tags

Related Courses

À la découverte des télécommunications
Institut Mines-Télécom via France Université Numerique
Data Platform, Cloud Networking and AI in the Cloud
Intel via Coursera
HPE Aruba Networking Basics
Aruba via Coursera
HPE Aruba Networking Basics (Portuguese)
Aruba via Coursera
أساسيات بروتوكول الانترنت الجيل السادس مع تقسيم الشبكات
Coursera Project Network via Coursera