Advanced System Security Topics

  • 4.5
Approx. 15 hours to complete

Course Summary

This course delves into advanced system security topics such as malware analysis, vulnerability assessment, and intrusion detection. Students will gain practical experience through hands-on labs and will be equipped with the skills needed to secure modern computing systems.

Key Learning Points

  • Learn how to analyze malware and detect intrusions
  • Gain practical experience through hands-on labs
  • Understand the latest techniques used by cyber criminals and learn how to defend against them

Related Topics for further study


Learning Outcomes

  • Understand advanced system security topics
  • Gain practical experience through hands-on labs
  • Be equipped with the skills needed to secure modern computing systems

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of computer networking and security
  • Familiarity with programming concepts

Course Difficulty Level

Advanced

Course Format

  • Online self-paced course
  • Hands-on labs

Similar Courses

  • Cybersecurity Essentials
  • Network Security

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Eugene Kaspersky

Related Books

Description

In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. We show how Google Map and Web Crytpo

Outline

  • Enhance Security with Geolocation
  • Lesson 1.1 Location Based Encryption
  • Lesson 4.2 Secure Enhanced Geolocking
  • Ensure Data Delivery to Right Location
  • Read the seminal location based encryption paper by Scott Logan and Dorothy E. Denning.
  • Read SEG master project report by Ashish Korpe
  • L1.1 Practice Quiz
  • L1.2. Practice Quiz
  • L1.3. Practice Quiz
  • Quiz: M1 quiz
  • Enhance Security with Network and Context Information
  • Verify User Location Using WiFi System
  • Location Verification Using Bluetooth Low Energy Devices
  • Right Path Right Place Data Delivery
  • Read the following papers related to Right Place Verification
  • Read paper on using RSSI measurement of BLE devices for localization
  • Read R2D2 paper on BLE location verification and SDN Data Path Confidence Analysis
  • L2.1 Practice Quiz
  • L2.2. Practice Quiz
  • L2.3 Practice Quiz
  • M2 quiz
  • Authentication and Role Based Access Control
  • Authentication Credentials
  • Digital Certificate Creation
  • Role Based Access Control (RBAC)
  • RBAC Examples: Docker UCP and AWS IAM
  • Watch OAuth presentation.
  • Read how digital certificates are created for secure web access
  • Reading assignments for RBAC.
  • Read Docker and AWS RBAC support example.
  • L3.1 Practice Quiz
  • L3.2 Practice Quiz
  • L3.3 Practice Quiz
  • M3 Quiz
  • Authorization and Attribute Based Access Control
  • Privilege Management Infrastructure and Attribute Certificates
  • eXtensible Access Control Markup Language (XACML)
  • Attribute Based Access Control
  • Enforce Testbed as an ABAC Example
  • Read the following paper which utilize attribute certificates for secure information sharing.
  • Read key sections of OASIS Standard XACML version 3.0
  • Read Osama Khaleel's master thesis on Implementing an ABAC system with XACML 2.0
  • L4.1 Practice Quiz
  • L4.2 Practice Quiz
  • Quiz L4.3 Practice Quiz
  • M4 Quiz

Summary of User Reviews

The Advanced System Security Topics course on Coursera has received positive reviews from learners. Many users praised the course for its comprehensive coverage of advanced security topics. Overall, the course has been highly rated by learners.

Key Aspect Users Liked About This Course

Comprehensive coverage of advanced security topics

Pros from User Reviews

  • In-depth and practical content
  • High-quality lectures and assignments
  • Engaging and knowledgeable instructors
  • Good balance between theory and practice
  • Useful for professionals in the field

Cons from User Reviews

  • Some learners found the course challenging and time-consuming
  • The course may not be suitable for beginners in cybersecurity
  • Some users felt that the course lacked interaction with the instructors
  • The course can be expensive for some learners
  • Some learners found the course lacking in hands-on exercises
English
Available now
Approx. 15 hours to complete
Edward Chow, Greg Williams
University of Colorado System
Coursera

Instructor

Edward Chow

  • 4.5 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses