University of Colorado Boulder - Advanced System Security Topics
- Offered byCoursera
Advanced System Security Topics at Coursera Overview
Duration | 15 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Advanced System Security Topics at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 4 of 4 in the Advanced System Security Design Specialization
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 15 hours to complete
- English Subtitles: Arabic, French, Portuguese (European), Italian, Vietnamese, German, Russian, English, Spanish
Advanced System Security Topics at Coursera Course details
- In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. We show how Google Map and Web Crytpo
- API can be integrated for encrypted document on web browser without download apps and associate them with geolocking area to restrict unauthorize and improper accesses.
Advanced System Security Topics at Coursera Curriculum
Enhance Security with Geolocation
Lesson 1.1 Location Based Encryption
Lesson 4.2 Secure Enhanced Geolocking
Ensure Data Delivery to Right Location
Read the seminal location based encryption paper by Scott Logan and Dorothy E. Denning.
Read SEG master project report by Ashish Korpe
L1.1 Practice Quiz
L1.2. Practice Quiz
L1.3. Practice Quiz
Quiz: M1 quiz
Enhance Security with Network and Context Information
Verify User Location Using WiFi System
Location Verification Using Bluetooth Low Energy Devices
Right Path Right Place Data Delivery
Read the following papers related to Right Place Verification
Read paper on using RSSI measurement of BLE devices for localization
Read R2D2 paper on BLE location verification and SDN Data Path Confidence Analysis
L2.1 Practice Quiz
L2.2. Practice Quiz
L2.3 Practice Quiz
M2 quiz
Authentication and Role Based Access Control
Authentication Credentials
Digital Certificate Creation
Role Based Access Control (RBAC)
RBAC Examples: Docker UCP and AWS IAM
Watch OAuth presentation.
Read how digital certificates are created for secure web access
Reading assignments for RBAC.
Read Docker and AWS RBAC support example.
L3.1 Practice Quiz
L3.2 Practice Quiz
L3.3 Practice Quiz
M3 Quiz
Authorization and Attribute Based Access Control
Privilege Management Infrastructure and Attribute Certificates
eXtensible Access Control Markup Language (XACML)
Attribute Based Access Control
Enforce Testbed as an ABAC Example
Read the following paper which utilize attribute certificates for secure information sharing.
Read key sections of OASIS Standard XACML version 3.0
Read Osama Khaleel's master thesis on Implementing an ABAC system with XACML 2.0
L4.1 Practice Quiz
L4.2 Practice Quiz
Quiz L4.3 Practice Quiz
M4 Quiz