NYU - Cyber Attack Countermeasures
- Offered byCoursera
Cyber Attack Countermeasures at Coursera Overview
Duration | 14 hours |
Mode of learning | Online |
Difficulty level | Intermediate |
Credential | Certificate |
Cyber Attack Countermeasures at Coursera Highlights
- 17% got a pay increase or promotion
- 29% got a tangible career benefit from this course
- Earn a certificate upon successful completion from NYU
- Learn from research professor of NYU and CEO, TAG Cyber LLC
Cyber Attack Countermeasures at Coursera Course details
- This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
- The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes.
Cyber Attack Countermeasures at Coursera Curriculum
Week 1: Cyber Security Safeguards
Introduction: What You Will Learn from This Course on Cyber Security
Assignments and Reading
Safeguards and Countermeasures
Reference Model
Orange Book Compliance
Bell La Padula Model
Biba Integrity Model
Issues with Subject-Object-Actions Models
Covert Channels
Information Flow Models and Hook-Up Theorem - Part 1
Information Flow Models and Hook-Up Theorem - Part 2
Welcome Kirsten Bay
Week 2: Understanding Authentication Protocols
Assignments and Reading
Identification and Authentication
Factors of Authentication including 2FA
Authentication Protocol Schema and Zones
Passwords and Analysis
Hand-Held Authentication Protocol (Part 1: Implementation)
Hand-Held Authentication Protocol (Part 2: Analysis and Cryptanalysis)
Welcome Lior Frenkel
RSA SecureID Protocol (Part 1: Implementation)
RSA SecureID Protocol (Part 2: Analysis)
Week 3: Introducing Conventional Cryptography
Assignments and Reading
Lamports S/Key Protocol (Part 1: Implementation)
Lamports S/Key Protocol (Part 2: Analysis)
Welcome Ajoy Kumar
Kerberos (Part 1: Implementation TGT Issuance)
Kerberos (Part 2: Implementation TBOB Issuance)
Basic Cryptosystems and Properties
Cryptographic Algorithm Design
DES Design
Triple-DES
Week 4: Overview of Public Key Cryptographic Methods
Assignments and Reading
CBC Mode Block Cryptography
Conventional Cryptography Scaling Issues
Public Key Crypto (Basics)
Public Key Secrecy
Public Key Digital Signature
Cryptographic Message Exchange
Diffie-Hellman Key Exchange
Key Distribution and Certification Authority
Secure Sockets Layer
The Story of James Ellis and Clifford Cox
Welcome Franscis Cianfrocca