University of Colorado System

Security and Privacy in TOR Network

This course is part of Advanced System Security Design Specialization

Taught in English

Some content may not be translated

Edward Chow
Greg Williams
Richard White

Instructors: Edward Chow

5,782 already enrolled

Included with Coursera Plus

Course

Gain insight into a topic and learn the fundamentals

4.2

(32 reviews)

Intermediate level
Some related experience required
22 hours (approximately)
Flexible schedule
Learn at your own pace

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

17 quizzes

Course

Gain insight into a topic and learn the fundamentals

4.2

(32 reviews)

Intermediate level
Some related experience required
22 hours (approximately)
Flexible schedule
Learn at your own pace

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the Advanced System Security Design Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 4 modules in this course

In this module, we learn the basic concepts of Tor network for protecting the privacy of Tor users and how to use the Tor browser features to access the web sites while preserving the anonimity, change the entry guard and exit node of the Tor circuit, learn how to setup Tor software package on a Linux machine and start its service, and use torify to run network commands, such as ssh or curl command, but use a Tor circuit as an outgoing connection

What's included

4 videos4 readings3 quizzes1 peer review

In this module, we learn how the hidden service architecture and protocol work, and how to set up the hidden server to provide network services on the Tor network without revealing the public IP address. We also learn the best practice of managing the hidden server anonymously and hide the version information of web server, OS, and installed software packages.

What's included

3 videos1 reading2 quizzes1 peer review

In this module we learn the basic components of the censorship systems, the censor model and the related challenges. We learn to define the censor's sphere of influence and sphere of visibility, and their impact on the techniques that can be deployed by the censorship systems. We will be able to describe the basic components of the censor's attack model, explain different fingerprinting methods and evaluating their strength and weakness. We will study different direct censorship method and learn the limitations imposed upon the range of censorship actions.

What's included

5 videos5 readings6 quizzes

In this module, we will learn the two main functional components of censorship resistance system (CRS) and explain the steps to establish the CRS communications. We will understand the operating requirements for establishing the CRS communications and learn the techniques for hiding information and avoid tracking using CRS channels. We will learn the basic CRS properties shared by CRS' and their purposes. We will comprehend different methods for obtaining CRS credentials and reduce faking/testing of them. We will be able to deploy different schemes for resisting active probing, identify different schemes to establish user trust. We will learn how to implement methods for evading censor detection and blocking. We will understand various methods for protecting publisher information and current open and active CRS research areas.

What's included

5 videos5 readings6 quizzes

Instructors

Instructor ratings
3.7 (7 ratings)
Edward Chow
University of Colorado System
8 Courses116,997 learners

Offered by

Recommended if you're interested in Computer Security and Networks

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

Showing 3 of 32

4.2

32 reviews

  • 5 stars

    56.25%

  • 4 stars

    28.12%

  • 3 stars

    6.25%

  • 2 stars

    0%

  • 1 star

    9.37%

VM
5

Reviewed on Jun 28, 2020

D
4

Reviewed on Nov 29, 2020

New to Computer Security and Networks? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions