- Level Professional
- المدة 19 ساعات hours
- الطبع بواسطة New York University
-
Offered by
عن
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema. The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes.الوحدات
Module 1
2
Assignment
- Practice Question
- Practice Question
12
Videos
- Introduction: What You Will Learn from This Course on Cyber Security
- Assignments and Reading
- Safeguards and Countermeasures
- Reference Model
- Orange Book Compliance
- Bell La Padula Model
- Biba Integrity Model
- Issues with Subject-Object-Actions Models
- Covert Channels
- Information Flow Models and Hook-Up Theorem - Part 1
- Information Flow Models and Hook-Up Theorem - Part 2
- Welcome Kirsten Bay
Module 1 Assignments
1
Assignment
- Module 1 Quiz
6
Readings
- Required: “Hookup Theorem,” D. McCullough
- Required: “Password Security: A Case History,” Morris and Thompson
- Video: “On Testing Theories,” Richard Feynman
- Video: “The Security Mirage,” Bruce Schneier, TED Talk
- Suggested: Introduction to Cyber Security, (Ch. 9 - 10)
- Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 9 – 10)
Module 2
1
Discussions
- Passwords
10
Videos
- Assignments and Reading
- Identification and Authentication
- Factors of Authentication including 2FA
- Authentication Protocol Schema and Zones
- Passwords and Analysis
- Hand-Held Authentication Protocol (Part 1: Implementation)
- Hand-Held Authentication Protocol (Part 2: Analysis and Cryptanalysis)
- Welcome Lior Frenkel
- RSA SecureID Protocol (Part 1: Implementation)
- RSA SecureID Protocol (Part 2: Analysis)
Module 2 Assignments
1
Assignment
- Module 2 Quiz
6
Readings
- Required: “Protection of Information in Computer Systems,” Saltzer and Schroeder
- Required: “A Note on the Confinement Problem,” Lampson
- Video: “The 1’s and 0’s behind Cyber Warfare” Chris Domas, TED Talk
- Video: “The Growth of Cryptography,” Ronald Rivest
- Suggested: Introduction to Cyber Security, (Ch. 11 - 12)
- Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 11 – 12)
Module 3
1
Assignment
- Practice Question
10
Videos
- Assignments and Reading
- Lamport’s S/Key Protocol (Part 1: Implementation)
- Lamport’s S/Key Protocol (Part 2: Analysis)
- Welcome Ajoy Kumar
- Kerberos (Part 1: Implementation – TGT Issuance)
- Kerberos (Part 2: Implementation – TBOB Issuance)
- Basic Cryptosystems and Properties
- Cryptographic Algorithm Design
- DES Design
- Triple-DES
Module 3 Assignments
1
Assignment
- Module 3 Quiz
4
Readings
- Required: “Method of implementing the data encryption standard with reduced computation,” Patent US 7103180
- Video: RSA Cyber Security with John Stewart, 2013
- Suggested: Introduction to Cyber Security, (Ch. 13 - 14)
- Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 13 – 14)
Module 4
12
Videos
- Assignments and Reading
- CBC Mode Block Cryptography
- Conventional Cryptography Scaling Issues
- Public Key Crypto (Basics)
- Public Key – Secrecy
- Public Key – Digital Signature
- Cryptographic Message Exchange
- Diffie-Hellman Key Exchange
- Key Distribution and Certification Authority
- Secure Sockets Layer
- The Story of James Ellis and Clifford Cox
- Welcome Franscis Cianfrocca
Module 4 Assignments
1
Assignment
- Module 4 Quiz
5
Readings
- Required: “New Directions in Cryptography,” Diffie and Hellman
- Required: “Non-Secret Encryption,” James Ellis
- Video: “A Brief History of Cryptography with Akamai Chief, Andy Ellis
- Suggested: Introduction to Cyber Security, (Ch. 15 - 16)
- Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 15 – 16)
Final Project
1
Peer Review
- Selecting and Managing Public and Private Keys
Auto Summary
"Cyber Attack Countermeasures" is a professional-level course offered by Coursera in the IT & Computer Science domain. Led by expert instructors, it covers foundational cyber defense models, authentication methods, and cryptographic techniques including RSA SecureID, Kerberos, block ciphers, and SSL for secure e-commerce. The course spans 1140 minutes and is available through a Starter subscription, ideal for IT professionals seeking to enhance their cybersecurity skills.

Dr. Edward G. Amoroso