About this 전문분야
최근 조회 12,760

100% 온라인 강좌

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 일정

유연한 마감을 설정하고 유지 관리합니다.

중급 단계

완료하는 데 약 4개월 필요

매주 4시간 권장

영어

자막: 영어

100% 온라인 강좌

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 일정

유연한 마감을 설정하고 유지 관리합니다.

중급 단계

완료하는 데 약 4개월 필요

매주 4시간 권장

영어

자막: 영어

How the 전문분야 Works

강좌 수강

Coursera 전문 분야는 기술을 완벽하게 습득하는 데 도움이 되는 일련의 강좌입니다. 시작하려면 전문 분야에 직접 등록하거나 강좌를 둘러보고 원하는 강좌를 선택하세요. 하나의 전문 분야에 속하는 강좌에 등록하면 해당 전문 분야 전체에 자동으로 등록됩니다. 단 하나의 강좌만 수료해도 됩니다. — 학습을 일시 중지하거나 언제든 구독을 종료할 수 있습니다. 학습자 대시보드를 방문하여 강좌 등록 상태와 진도를 추적해 보세요.

실습 프로젝트

모든 전문 분야에는 실습 프로젝트가 포함되어 있습니다. 전문 분야를 완료하고 수료증을 받으려면 프로젝트를 성공적으로 마쳐야 합니다. 전문 분야에 별도의 실습 프로젝트 강좌가 포함되어 있는 경우 각 강좌를 완료해야 프로젝트를 시작할 수 있습니다.

수료증 취득

모든 강좌를 마치고 실습 프로젝트를 완료하면 취업할 때나 전문가 네트워크에 진입할 때 제시할 수 있는 수료증을 취득할 수 있습니다.

how it works

이 전문분야에는 4개의 강좌가 있습니다.

강좌1

Design and Analyze Secure Networked Systems

3.9
58개의 평가
14개의 리뷰

In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. We will examine the trustworthiness of programs and data installed in our systems and show the proper way to verify their integrity and authenticity. We will apply principle of least privileges for controlling the shared access given to different groups of users and system processes. On Amazon Cloud instances, we will use GnuPG software to generate public/private key pair for signing/verifying documents and open source software, and for encrypting documents. We will learn how to publish software, the related signature and release key on web server and publish public key to PGP key server for others to retrieve. We will learn Public Key Infrastructure (PKI) and Linux utility to serve as a CA for an organization, learn how to sign certificate request for clients or servers in secure email and web applications.

...
강좌2

Basic Cryptography and Programming with Crypto API

4.1
12개의 평가
3개의 리뷰

In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. We will also learn the efficient symmetric key cryptography algorithms for encrypting data, discuss the DES and AES standards, study the criteria for selecting AES standard, present the block cipher operating modes and discuss how they can prevent and detect the block swapping attacks, and examine how to defend against replay attacks. We will learn the Diffie-Hellman Symmetric Key Exchange Protocol to generate a symmetric key for two parties to communicate over insecure channel. We will learn the modular arithmetic and the Euler Totient Theorem to appreciate the RSA Asymmetric Crypto Algorithm, and use OpenSSL utility to realize the basic operations of RSA Crypto Algorithm. Armed with these knowledge, we learn how to use PHP Crypto API to write secure programs for encrypting and decrypting documents and for signing and verify documents. We then apply these techniques to enhance the registration process of a web site which ensures the account created is actually requested by the owner of the email account.

...
강좌3

Hacking and Patching

4.1
52개의 평가
12개의 리뷰

In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn how to hack web apps with SQL injection vulnerabilities and retrieve user profile information and passwords. You will learn how to patch them with input validation and SQL parameter binding. You will learn the hacking methodology, Nessus tool for scanning vulnerabilities, Kali Linux for penetration testing, and Metasploit Framework for gaining access to vulnerable Windows Systems, deploying keylogger, and perform Remote VNC server injection. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. You will learn how to clone a Kali instance with AWS P2 GPU support and perform hashcat password cracking using dictionary attacks and known pattern mask attacks.

...
강좌4

Secure Networked System with Firewall and IDS

3.3
10개의 평가
2개의 리뷰

In this MOOC, we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Building upon these lessons we will go in-depth on the popular Linux firewall. Finally we will learn about Network IDS and Host IDS, including a deep dive into Snort.

...

강사

Avatar

Edward Chow

Professor
Computer Science

콜로라도 대학교 정보

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

자주 묻는 질문

  • 네! 시작하려면 관심 있는 강좌 카드를 클릭하여 등록합니다. 강좌를 등록하고 완료하면 공유할 수 있는 인증서를 얻거나 강좌를 청강하여 강좌 자료를 무료로 볼 수 있습니다. 전문 분야 과정에 있는 강좌에 등록하면, 전체 전문 분야에 등록하게 됩니다. 학습자 대시보드에서 진행 사항을 추적할 수 있습니다.

  • 이 강좌는 100% 온라인으로 진행되므로 강의실에 직접 참석할 필요가 없습니다. 웹 또는 모바일 장치를 통해 언제 어디서든 강의, 읽기 자료, 과제에 접근할 수 있습니다.

  • 16 weeks.

  • Know one high level programming language, basic Unix system commands, and discrete mathematics in particular the number theory.

  • Yes. MOOC1 covers security design principles and concepts. Learning it first will help understand basic security terms which are used in other MOOCs and how the principles and basic security services are applied in various situations. MOOC2 helps the learners understanding the basic cryptography and related crypto API to create secure web app. These knowledge help learners assess the hacking and patching skill/tools needed in MOOC3. MOOC4 should be done last since it integrates all cyber security knowledge to implement security policies and their enforcement procedures for hardening a networked systems.

  • At this time, this Specialization is not credit bearing. At a future time, this content may contribute in part towards university credit. Please note that additional costs and requirements may be entailed once credit is offered.

  • You should be able to create public/private keys, certificate requests, install/sign/verify them for web server and client authentication, secure emails, and code signing.

    You should be able to write secure web apps with Crypto API to implement the confidentiality, integrity, and availability basic security services.

    You should be able to hack web applications with Command Injection and SQL Injection vulnerabilities and patch them.

    You should be able to apply penetration testing tool to exploit vulnerable systems.

    You should be able to use hashcat softare and AWS P3 GPU to crack passwords using dictionary attacks and mask patterns.

    You should be able to configure firewall and IDS for secure network systems using AWS VPCs.

    You should be able to specify effective security policies and implement efficient enforcement procedures by applying security design principles for securing network systems.

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.