We may earn an affiliate commission when you visit our partners.
Course image
Richard White, Greg Williams, and Edward Chow

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.

Enroll now

Share

Help others find Specialization from Coursera by sharing it with your friends and followers:

What's inside

Four courses

Cloud Computing Security

In this MOOC, we will learn Cloud Computing basics using AWS as an example. We will guide you to create AWS account, planning AWS resources for your cloud systems, create AWS EC2 instances, access them and configure the popular LAMP web services with MySQL database.

DDoS Attacks and Defenses

In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware. You will also learn about DDoS Defense techniques, including A2D2, an Autonomous Anti-DDoS Network for small/medium size organizations. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidence, deploy firewall features to reduce the impact of DDoS on your system, and develop strategies for dealing with future DDoS attacks.

Security and Privacy in TOR Network

In this MOOC, we will learn about TOR's basic concept and how they protect users' security and privacy. We will examine how TOR realizes anonymity and utilizes its service. We will also learn how to set up a hidden service on AWS and manage it using Tor circuit. By the end of this course, you should be able to utilize TOR browser to protect your privacy and set up hidden service on the current interface.

Advanced System Security Topics

In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controlling secure access to web documents and network resources with attribute certificates, and XACML architecture components.

Learning objectives

  • Understand basic cloud services and its application and how to work with aws cloud computing resources.
  • Understand, analyze and evaluate ddos attacks, detection and prevention techniques.
  • Understand and apply basic security and privacy in tor network and blockchain systems.
  • Understand geo-location/attribute based access security and learn how to apply xacml in abac systems.

Save this collection

Save Advanced System Security Design to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser