Coursera
Coursera Logo

University of Colorado Boulder - Design and Analyze Secure Networked Systems 

  • Offered byCoursera

Design and Analyze Secure Networked Systems
 at 
Coursera 
Overview

Duration

16 hours

Mode of learning

Online

Difficulty level

Intermediate

Credential

Certificate

Design and Analyze Secure Networked Systems
 at 
Coursera 
Highlights

  • Offered by University of Colorado System
  • Requires effort of 4 hours per week
  • Learn from expert professors of University of Colorado System
  • Earn a certificate upon successful completion
Read more
Details Icon

Design and Analyze Secure Networked Systems
 at 
Coursera 
Course details

More about this course
  • In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. We will examine the trustworthiness of programs and data installed in our systems and show the proper way to verify their integrity and authenticity. We will apply principle of least privileges for controlling the shared access given to different groups of users and system processes. On Amazon Cloud instances, we will use GnuPG software to generate public/private key pair for signing/verifying documents and open source software, and for encrypting documents. We will learn how to publish software, the related signature and release key on web server and publish public key to PGP key server for others to retrieve. We will learn Public Key Infrastructure (PKI) and Linux utility to serve as a CA for an organization, learn how to sign certificate request for clients or servers in secure email and web applications.
Read more

Design and Analyze Secure Networked Systems
 at 
Coursera 
Curriculum

Week 1: Cybersecurity Concepts and Security Principles

Course Overview

Lesson 1. Vulnerabilities and Threats

Method, Opportunity, and Motive

Confidentiality, Integrity, and Availability

Risk, Risk Assessment and Method of Defense

Security Principles: Defense in Depth, Defense with Diversity, Cyber Resilience

Week 2: Protect Data Access and Verify Source of Trust

Apply Principle of Least Privileges for Access Control

Principle of Adequate Data Protection

In Software We Trust. Really

Week 3: Using GPG to Sign/Verify Software

Sign Software with GPG

Verify Software Integrity and Authenticity

Web of Trust

Week 4: Be a CA, Setup Secure Server and Client Certificate

Public Key Infrastructure

What are in a Certificate?

Being Your Own CA

Server Certificate and Installation

Setup Client Certificate

Client Server Mutual Authentication

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6715 CoursesRight Arrow Icon
qna

Design and Analyze Secure Networked Systems
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...