Design and Analyze Secure Networked Systems

  • 3.8
Approx. 15 hours to complete

Course Summary

Learn how to design secure networked systems in this course, which covers topics such as network security protocols, cryptography, and risk assessment.

Key Learning Points

  • Understand the fundamentals of network security protocols and cryptography
  • Learn how to perform risk assessment and management for networked systems
  • Explore the latest trends and technologies in secure network design

Related Topics for further study


Learning Outcomes

  • Design secure networked systems that protect against common threats
  • Implement network security protocols and cryptography techniques to secure data transmission
  • Evaluate risk and develop mitigation strategies for networked systems

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of computer networks
  • Familiarity with operating systems and software applications

Course Difficulty Level

Intermediate

Course Format

  • Self-paced
  • Online
  • Video lectures
  • Assignments
  • Quizzes

Similar Courses

  • Cybersecurity Fundamentals
  • Applied Cryptography

Related Education Paths


Related Books

Description

In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. We will examine the trustworthiness of programs and data installed in our systems and show the proper way to verify their integrity and authenticity. We will apply principle of least privileges for controlling the shared access given to different groups of users and system processes. On Amazon Cloud instances, we will use GnuPG software to generate public/private key pair for signing/verifying documents and open source software, and for encrypting documents. We will learn how to publish software, the related signature and release key on web server and publish public key to PGP key server for others to retrieve. We will learn Public Key Infrastructure (PKI) and Linux utility to serve as a CA for an organization, learn how to sign certificate request for clients or servers in secure email and web applications.

Outline

  • Cybersecurity Concepts and Security Principles
  • Course Overview
  • Lesson 1. Vulnerabilities and Threats
  • Method, Opportunity, and Motive
  • Confidentiality, Integrity, and Availability
  • Risk, Risk Assessment and Method of Defense
  • Security Principles: Defense in Depth, Defense with Diversity, Cyber Resilience
  • Cybersecurity Concepts
  • M.O.M.
  • C.I.A.
  • NIST RMF
  • Defense in Depth
  • Exam 1.1. Assess Cybersecurity Concepts and Security Principles Learned
  • Protect Data Access and Verify Source of Trust
  • Apply Principle of Least Privileges for Access Control
  • Principle of Adequate Data Protection
  • In Software We Trust. Really?
  • Apply Principle of Least Privileges for Access Control
  • Inside the Cyberattack that Shocked the US Government", by Brendan Koerner on OPM breach
  • also good to add some additional reading beyond the slides
  • Exam 1.2. Assess How to Protect Data Access and Verify Source of Trust
  • Using GPG to Sign/Verify Software
  • Sign Software with GPG
  • Verify Software Integrity and Authenticity
  • Web of Trust
  • The GNU Privacy Handbook
  • Making and verifying signatures
  • How to send/receive encrypted email with GnuPG
  • Exam 1.3. Assess the skill of using gpg to sign and verify software.
  • Be a CA, Setup Secure Server and Client Certificate
  • Public Key Infrastructure
  • What are in a Certificate?
  • Being Your Own CA
  • Server Certificate and Installation
  • Setup Client Certificate
  • Client Server Mutual Authentication
  • Verisign
  • Secure Web Access
  • Server Certificates
  • Client Certificates
  • Example of Mutual Authentication
  • Exam 1.4. Assess PKI Concepts and Certificates Creation/Signing with PKI

Summary of User Reviews

Learn to design secure networked systems with this highly-rated course on Coursera. Many users found the content to be highly informative and applicable in real-world scenarios.

Key Aspect Users Liked About This Course

The course covers a wide range of topics and provides practical knowledge that can be applied in real-world scenarios.

Pros from User Reviews

  • In-depth coverage of network security concepts
  • Real-world examples and case studies
  • Well-structured and easy to follow
  • Engaging and knowledgeable instructors
  • Great for professionals and beginners alike

Cons from User Reviews

  • Some users found the pace to be too slow
  • The course can be quite technical and may require some prior knowledge
  • Limited opportunities for interaction with instructors or other students
  • No hands-on exercises or practical assignments
  • Some users found the price to be too high
English
Available now
Approx. 15 hours to complete
Edward Chow
University of Colorado System
Coursera

Instructor

Edward Chow

  • 3.8 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses