- Level Professional
- المدة 22 ساعات hours
- الطبع بواسطة University of Colorado System
-
Offered by
عن
In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS instance. We will also learn the best practices and operational security in providing the hidden services. We will learn how to manage the hidden server using Tor circuit and configure the web server not to reveal the software version information. We also show how it can be defended. To improve TOR’s performance, we discuss the cloud based TOR and their implementation. By the end of this course, you should be able to utilize TOR browser to protect your privacy, set up hidden service on current interface that protect your servers and make it anonymous, you will choosing entry guards wisely since your adversary will try to attack them with DDoS traffic and force you to choose their relay as your entry and exit router. We will also learn the basic components of both censorship and censorship resistance systems, and the scheme deployed by these systems and their attacks.الوحدات
L1.1 Introduction to TOR Networking
1
Assignment
- L1.1 Practice Quiz
1
Videos
- Welcome to TOR Networking
2
Readings
- TEDTalk: The Tor Project, protecting online anonimity
- Get help and meet other learners in this course. Join your discussion forums!
L1.2 TOR Basic Concepts
1
Assignment
- L1.2 Practice Quiz
1
Videos
- TOR Basic Concepts
1
Readings
- Basic TOR Concepts
L1.3 Realizing Anonymity in TOR
1
Peer Review
- Maintain Anonymity with Tor Browser and Tor Software.
1
Videos
- Realize Anonymity in TOR
L1.4 Sniper Attack on TOR
1
Videos
- Sniper Attack on TOR
1
Readings
- The Sniper Attacks: Anonymously deanonymizing and disabling the Tor network
M1 Exam
1
Assignment
- M1 Exam
L2.1 Hidden Service and Their Attacks
1
Assignment
- L2.1 Practice Quiz
1
Peer Review
- Project 2b. Set up and verify a Tor hidden service.
1
Videos
- Hidden Services and Their Attacks
1
Readings
- Setup procedures and Best Practices for Hosting Onion Services
L2.2 Defense against Deanonymizing Attacks
1
Videos
- Defense Against Deanonymizing Attack
L2.3 Creating a Cloud Based TOR
1
Videos
- Cloud Based TOR
M2 Exam
1
Assignment
- M2 Exam
L3.1: Censor Model and Censorship Resistance Systems
1
Assignment
- L1 Practice Quiz
1
Videos
- Censor Model and Censorship Resistance System Survey Result
1
Readings
- Read Section 1 of "SoK: Making Sense of Censorship Resistance Systems"
L3.2 Censor Attack Model and Apparatus
1
Assignment
- L3.2 Practice Quiz
1
Videos
- L3-2 CS6910 Censor Attack Model and Apparatus
1
Readings
- Read censorship apparatus model and censor's attack model
L3.3 Fingerprinting
1
Assignment
- L3.3 Practice Quiz
1
Videos
- L3-3 Fingerprinting
1
Readings
- L3-3. Fingerprinting.
L3.4 Direct Censorship
1
Assignment
- L3.4 Practice Quiz
1
Videos
- L3-4. Direct Censorship
1
Readings
- L3.4. Direct Censorship
L3.5 Range of Censorship Actions
1
Assignment
- L3.5 Practice Quiz
1
Videos
- L3.5. Range of Censorship Actions
1
Readings
- L3.5. Range of Censorship Actions
M3 Exam
1
Assignment
- M3 Exam
L4.1 Overview of Censorship Resistance Systems
1
Assignment
- L4.1 Practice Quiz
1
Videos
- L4.1. Overview of Censorship Resistance Systems
1
Readings
- L4.1. Censorship Resistancde System Overview
L4.2 CRS Properties
1
Assignment
- L4.2 Practice Quiz
1
Videos
- L4.2. CRS Properties
1
Readings
- L4.2. CRS Properties.
L4.3 Techniques for CRS Communication Establishment Phase
1
Assignment
- L4.3 Practice Quiz
1
Videos
- L4.3. Techniques for CRS Communication Establishment Phase
1
Readings
- L4.3. Techniques for Communication Establishment Phase .
L4.4 Techniques for CRS Conversation Phase
1
Assignment
- L4.4 Practice Quiz
1
Videos
- L4.4. Techniques for CRS Conversation Phase.
1
Readings
- L4.4. Techniques for Conversation Phase
L4.5 Open CRS Research Areas
1
Assignment
- L4.5 Practice Quiz
1
Videos
- L4.5. Open CRS Research Areas
1
Readings
- L4.5. Open Areas and Research Challenges.
M4 Exam
1
Assignment
- M4 Exam
Auto Summary
Discover the intricacies of the TOR network with this IT & Computer Science course on Coursera. Led by an expert instructor, you'll explore TOR's security, privacy, and censorship resistance. Learn to utilize the TOR browser, set up hidden services, and defend against attacks. Ideal for professionals, the course spans 1320 minutes and offers Starter and Professional subscription options. Perfect for those aiming to enhance their cybersecurity skills and protect online anonymity.

Edward Chow

Greg Williams

Richard White