University of Colorado Boulder - Security and Privacy in TOR Network
- Offered byCoursera
Security and Privacy in TOR Network at Coursera Overview
Duration | 22 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Intermediate |
Official Website | Explore Free Course |
Credential | Certificate |
Security and Privacy in TOR Network at Coursera Highlights
- Earn a shareable certificate upon completion.
- Flexible deadlines according to your schedule.
- Earn a certificate from the University of Colorado System upon completion of course.
Security and Privacy in TOR Network at Coursera Course details
- In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR?s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS instance. We will also learn the best practices and operational security in providing the hidden services. We will learn how to manage the hidden server using Tor circuit and configure the web server not to reveal the software version information. We also show how it can be defended. To improve TOR?s performance, we discuss the cloud based TOR and their implementation.
- By the end of this course, you should be able to utilize TOR browser to protect your privacy, set up hidden service on current interface that protect your servers and make it anonymous, you will choosing entry guards wisely since your adversary will try to attack them with DDoS traffic and force you to choose their relay as your entry and exit router. We will also learn the basic components of both censorship and censorship resistance systems, and the scheme deployed by these systems and their attacks.
Security and Privacy in TOR Network at Coursera Curriculum
The Onion Routing (TOR)
Welcome to TOR Networking
TOR Basic Concepts
Realize Anonymity in TOR
Sniper Attack on TOR
TEDTalk: The Tor Project, protecting online anonimity
Basic TOR Concepts
The Sniper Attacks: Anonymously deanonymizing and disabling the Tor network
L1.1 Practice Quiz
L1.2 Practice Quiz
M1 Exam
Hidden Service on TOR and their Attacks
Hidden Services and Their Attacks
Defense Against Deanonymizing Attack
Cloud Based TOR
Setup procedures and Best Practices for Hosting Onion Services
L2.1 Practice Quiz
M2 Exam
Censorship Systems
Censor Model and Censorship Resistance System Survey Result
L3-2 CS6910 Censor Attack Model and Apparatus
L3-3 Fingerprinting
L3-4. Direct Censorship
L3.5. Range of Censorship Actions
Read Section 1 of "SoK: Making Sense of Censorship Resistance Systems"
Read censorship apparatus model and censor's attack model
L3-3. Fingerprinting.
L3.4. Direct Censorship
L3.5. Range of Censorship Actions
L1 Practice Quiz
L3.2 Practice Quiz
L3.3 Practice Quiz
L3.4 Practice Quiz
L3.5 Practice Quiz
M3 Exam
Censorship Resistance System (CRS)
L4.1. Overview of Censorship Resistance Systems
L4.2. CRS Properties
L4.3. Techniques for CRS Communication Establishment Phase
L4.4. Techniques for CRS Conversation Phase.
L4.5. Open CRS Research Areas
L4.1. Censorship Resistancde System Overview
L4.2. CRS Properties.
L4.3. Techniques for Communication Establishment Phase .
L4.4. Techniques for Conversation Phase
L4.5. Open Areas and Research Challenges.
L4.1 Practice Quiz
L4.2 Practice Quiz
L4.3 Practice Quiz
L4.4 Practice Quiz
L4.5 Practice Quiz
M4 Exam