YoVDO

Cyber Attack Countermeasures

Offered By: New York University (NYU) via Coursera

Tags

Cybersecurity Courses Block Ciphers Courses Public Key Cryptography Courses Kerberos Courses

Course Description

Overview

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.   The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes.

Syllabus

  • Cyber Security Safeguards
    • This module provides an introduction to security modeling, foundational frameworks, and basic safeguard approaches.
  • Understanding Authentication Protocols
    • This module introduces important protocols and techniques associated with advanced authentication processes.
  • Introducing Conventional Cryptography
    • This module introduces the foundations of conventional cryptography along with its practical application in Kerberos.
  • Overview of Public Key Cryptographic Methods
    • This module introduces the basics of public key cryptography including an overview of SSL and CA applications.

Taught by

Dr. Edward G. Amoroso

Tags

Related Courses

Cryptography I
Stanford University via Coursera
Introduction to Cryptology
Indian Institute of Technology Roorkee via Swayam
Symmetric Cryptography
University of Colorado System via Coursera
Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX
Foundations of Cryptography
NPTEL via Swayam