About this 전문분야

100% 온라인 강좌

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

탄력적인 일정

유연한 마감을 설정하고 유지 관리합니다.

초급 단계

Basic computer science background

완료하는 데 약 3개월 필요

매주 6시간 권장

영어

자막: 영어

배울 내용

  • Check

    Understand basic cloud services and its application and how to work with AWS cloud computing resources.

  • Check

    Understand, analyze and evaluate DDoS attacks, detection and prevention techniques.

  • Check

    Understand and apply basic security and privacy in TOR network and blockchain systems.

  • Check

    Understand geo-location/attribute based access security and learn how to apply XACML in ABAC systems.

귀하가 습득할 기술

DDoS attacks and defensesCloud Computing SecuritySecurity and Privacy in Tor networkgeolocation-based access controlAttribute-Based Access Control

100% 온라인 강좌

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

탄력적인 일정

유연한 마감을 설정하고 유지 관리합니다.

초급 단계

Basic computer science background

완료하는 데 약 3개월 필요

매주 6시간 권장

영어

자막: 영어

How the 전문분야 Works

강좌 수강

Coursera 전문 분야는 기술을 완벽하게 습득하는 데 도움이 되는 일련의 강좌입니다. 시작하려면 전문 분야에 직접 등록하거나 강좌를 둘러보고 원하는 강좌를 선택하세요. 하나의 전문 분야에 속하는 강좌에 등록하면 해당 전문 분야 전체에 자동으로 등록됩니다. 단 하나의 강좌만 수료해도 됩니다. — 학습을 일시 중지하거나 언제든 구독을 종료할 수 있습니다. 학습자 대시보드를 방문하여 강좌 등록 상태와 진도를 추적해 보세요.

실습 프로젝트

모든 전문 분야에는 실습 프로젝트가 포함되어 있습니다. 전문 분야를 완료하고 수료증을 받으려면 프로젝트를 성공적으로 마쳐야 합니다. 전문 분야에 별도의 실습 프로젝트 강좌가 포함되어 있는 경우 각 강좌를 완료해야 프로젝트를 시작할 수 있습니다.

수료증 취득

모든 강좌를 마치고 실습 프로젝트를 완료하면 취업할 때나 전문가 네트워크에 진입할 때 제시할 수 있는 수료증을 취득할 수 있습니다.

how it works

이 전문분야에는 4개의 강좌가 있습니다.

강좌1

클라우드 컴퓨팅 보안

4.6
23개의 평가
4개의 리뷰
In this MOOC, we will learn Cloud Computing basics using AWS as an example, We will guide you to create AWS account, planning AWS resources for your cloud systems, create AWS EC2 instances, access them and configure the popular LAMP web services with MySQL database. We will guide you to create user accounts for your programmer or operators using AWS Identify and Access management GUI, Register your domain name and setup DNS entry for your servers using AWS Route 53 in 22 mintues! and show you how to use AWS Command Line interface to create and managing instances and services programmatically. We then introduce AWS Load balancing feature, create load balancing cluster for scalability and reliability. We also demonstrate how to diagnose the problem introduced by the health check and firewall restriction conflicts. By the end of this course, you should be able to create your own web cluster with mysql databases, setup your users with credentials to manage your AWS resources/virtual machines either through their management control interface or using AWS CLI API using scripts. You will also learn the best practice in cloud security and debugging service interaction issues may arise in the cloud systems....
강좌2

DDoS Attacks and Defenses

4.5
14개의 평가
6개의 리뷰
In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks. For the pre-requisites, we recommend the learners take the Design and Analyze Secure Networked Systems course to learn the basic security concepts and principles and take the Secure Networked System with Firewall and IDS courses to learn the basic firewall and IDS systems....
강좌3

Security and Privacy in TOR Network

In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS instance. We will also learn the best practices and operational security in providing the hidden services. We will learn how to manage the hidden server using Tor circuit and configure the web server not to reveal the software version information. We also show how it can be defended. To improve TOR’s performance, we discuss the cloud based TOR and their implementation. By the end of this course, you should be able to utilize TOR browser to protect your privacy, set up hidden service on current interface that protect your servers and make it anonymous, you will choosing entry guards wisely since your adversary will try to attack them with DDoS traffic and force you to choose their relay as your entry and exit router. We will also learn the basic components of both censorship and censorship resistance systems, and the scheme deployed by these systems and their attacks....
강좌4

Advanced System Security Topics

In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. We show how Google Map and Web Crytpo API can be integrated for encrypted document on web browser without download apps and associate them with geolocking area to restrict unauthorize and improper accesses....

강사

Avatar

Edward Chow

Professor
Computer Science
Avatar

Greg Williams

Lecturer
Department of Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science

콜로라도 대학교 정보

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

자주 묻는 질문

  • 네! 시작하려면 관심 있는 강좌 카드를 클릭하여 등록합니다. 강좌를 등록하고 완료하면 공유할 수 있는 인증서를 얻거나 강좌를 청강하여 강좌 자료를 무료로 볼 수 있습니다. 전문 분야 과정에 있는 강좌에 등록하면, 전체 전문 분야에 등록하게 됩니다. 학습자 대시보드에서 진행 사항을 추적할 수 있습니다.

  • 이 강좌는 100% 온라인으로 진행되므로 강의실에 직접 참석할 필요가 없습니다. 웹 또는 모바일 장치를 통해 언제 어디서든 강의, 읽기 자료, 과제에 접근할 수 있습니다.

  • 16 weeks.

  • Know one high level programming language, basic Unix system commands, and discrete mathematics in particular the number theory. knowledge of basic cybersecurity will help, e.g., those in the Fundamentals of Computer Network Security Specialization.

  • No. These four MOOCs are pretty much independent.

  • No. But It will help you prepare to complete related university cybersecurity classes.

  • You should be able to develop advanced secure software tools and high available systems using cloud computing, TOR, and web-based crypto API.

    You will know how to implement new security and privacy preserving data security features including how to ensure data is requested and delivered to a specific location and over a specific path.

    You will know how to perform secure system design and implementation, vulnerability analysis.

    You will have better KSAs in performing Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.