Cyber Attack Countermeasures
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema. The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes.
None
Syllabus
Syllabus - What you will learn from this course
Week 1
Cyber Security Safeguards
Week 2
Understanding Authentication Protocols
Week 3
Introducing Conventional Cryptography
Week 4
Overview of Public Key Cryptographic Methods
FAQ
When will I have access to the lectures and assignments?
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.
The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Reviews
Excellent!! You are a great teacher, and I learned a lot. I have already applied the knowledge gained to my business. Grazie mille.
Great info, well-chosen readings, wish there were more practice problems. Assignments and quizzes are good for a Coursera course, but not great.
I like how Dr. Amoroso made some complicated concept sounds easy. I also love when he told us about the history of cyber security in this course.
Instructor makes it easy to understand and keeps it interesting. Especially enjoy the talks and due credits to the unsung hero's of the early cyber security scene.