Cyber Attack Countermeasures

  • 4.8
Approx. 19 hours to complete

Course Summary

Learn about the different types of cyber attacks and the countermeasures that can be taken to prevent them in this comprehensive course.

Key Learning Points

  • Understand the different types of cyber attacks and how they can be prevented
  • Learn about common cyber security tools and techniques
  • Gain practical skills in implementing cyber security measures
  • Explore the legal and ethical implications of cyber security
  • Discover emerging trends in cyber security

Job Positions & Salaries of people who have taken this course might have

    • USA: $76,410
    • India: ₹5,60,000
    • Spain: €30,000
    • USA: $76,410
    • India: ₹5,60,000
    • Spain: €30,000

    • USA: $118,082
    • India: ₹20,00,000
    • Spain: €44,000
    • USA: $76,410
    • India: ₹5,60,000
    • Spain: €30,000

    • USA: $118,082
    • India: ₹20,00,000
    • Spain: €44,000

    • USA: $84,793
    • India: ₹6,00,000
    • Spain: €32,000

Related Topics for further study


Learning Outcomes

  • Identify different types of cyber attacks and their countermeasures
  • Implement cyber security measures in practice
  • Understand the legal and ethical implications of cyber security

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of computer networks
  • Familiarity with cyber security concepts

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced
  • Video lectures
  • Assignments
  • Quizzes

Similar Courses

  • Cyber Security for Business
  • Cyber Security Fundamentals
  • Cyber Security Risk Management

Related Education Paths


Related Books

Description

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.

Outline

  • Cyber Security Safeguards
  • Introduction: What You Will Learn from This Course on Cyber Security
  • Assignments and Reading
  • Safeguards and Countermeasures
  • Reference Model
  • Orange Book Compliance
  • Bell La Padula Model
  • Biba Integrity Model
  • Issues with Subject-Object-Actions Models
  • Covert Channels
  • Information Flow Models and Hook-Up Theorem - Part 1
  • Information Flow Models and Hook-Up Theorem - Part 2
  • Welcome Kirsten Bay
  • Required: “Hookup Theorem,” D. McCullough
  • Required: “Password Security: A Case History,” Morris and Thompson
  • Video: “On Testing Theories,” Richard Feynman
  • Video: “The Security Mirage,” Bruce Schneier, TED Talk
  • Suggested: Introduction to Cyber Security, (Ch. 9 - 10)
  • Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 9 – 10)
  • Practice Question
  • Practice Question
  • Module 1 Quiz
  • Understanding Authentication Protocols
  • Assignments and Reading
  • Identification and Authentication
  • Factors of Authentication including 2FA
  • Authentication Protocol Schema and Zones
  • Passwords and Analysis
  • Hand-Held Authentication Protocol (Part 1: Implementation)
  • Hand-Held Authentication Protocol (Part 2: Analysis and Cryptanalysis)
  • Welcome Lior Frenkel
  • RSA SecureID Protocol (Part 1: Implementation)
  • RSA SecureID Protocol (Part 2: Analysis)
  • Required: “Protection of Information in Computer Systems,” Saltzer and Schroeder
  • Required: “A Note on the Confinement Problem,” Lampson
  • Video: “The 1’s and 0’s behind Cyber Warfare” Chris Domas, TED Talk
  • Video: “The Growth of Cryptography,” Ronald Rivest
  • Suggested: Introduction to Cyber Security, (Ch. 11 - 12)
  • Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 11 – 12)
  • Module 2 Quiz
  • Introducing Conventional Cryptography
  • Assignments and Reading
  • Lamport’s S/Key Protocol (Part 1: Implementation)
  • Lamport’s S/Key Protocol (Part 2: Analysis)
  • Welcome Ajoy Kumar
  • Kerberos (Part 1: Implementation – TGT Issuance)
  • Kerberos (Part 2: Implementation – TBOB Issuance)
  • Basic Cryptosystems and Properties
  • Cryptographic Algorithm Design
  • DES Design
  • Triple-DES
  • Required: “Method of implementing the data encryption standard with reduced computation,” Patent US 7103180
  • Video: RSA Cyber Security with John Stewart, 2013
  • Suggested: Introduction to Cyber Security, (Ch. 13 - 14)
  • Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 13 – 14)
  • Practice Question
  • Module 3 Quiz
  • Overview of Public Key Cryptographic Methods
  • Assignments and Reading
  • CBC Mode Block Cryptography
  • Conventional Cryptography Scaling Issues
  • Public Key Crypto (Basics)
  • Public Key – Secrecy
  • Public Key – Digital Signature
  • Cryptographic Message Exchange
  • Diffie-Hellman Key Exchange
  • Key Distribution and Certification Authority
  • Secure Sockets Layer
  • The Story of James Ellis and Clifford Cox
  • Welcome Franscis Cianfrocca
  • Required: “New Directions in Cryptography,” Diffie and Hellman
  • Required: “Non-Secret Encryption,” James Ellis
  • Video: “A Brief History of Cryptography with Akamai Chief, Andy Ellis
  • Suggested: Introduction to Cyber Security, (Ch. 15 - 16)
  • Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 15 – 16)
  • Module 4 Quiz

Summary of User Reviews

A comprehensive course on cyber attack countermeasures that received high praise from learners. The course covers various topics including prevention, detection, and response to cyber attacks. Many learners appreciated the practical approach of the course, which allowed them to apply the knowledge gained in real-world scenarios.

Key Aspect Users Liked About This Course

The practical approach of the course that allowed learners to apply the knowledge gained in real-world scenarios.

Pros from User Reviews

  • Comprehensive coverage of various topics related to cyber attack countermeasures.
  • Practical approach that allowed learners to apply the knowledge gained in real-world scenarios.
  • Engaging and knowledgeable instructors who provide clear explanations and examples.
  • Well-structured and organized content that is easy to follow.
  • Interactive elements such as quizzes and assignments that help learners reinforce their understanding.

Cons from User Reviews

  • Some learners found the course too technical and challenging, requiring a strong background in cybersecurity.
  • The course may not be suitable for beginners or those with no prior knowledge of cybersecurity.
  • Some learners found the course content to be outdated and not relevant to current cybersecurity threats.
  • The course may require a significant time commitment due to the amount of material covered.
  • Some learners found the course to be too focused on theoretical concepts and lacking in practical applications.
English
Available now
Approx. 19 hours to complete
Dr. Edward G. Amoroso
New York University
Coursera

Instructor

Dr. Edward G. Amoroso

  • 4.8 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses