- Level Professional
- المدة 17 ساعات hours
- الطبع بواسطة University of Colorado System
-
Offered by
عن
In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. We will examine the trustworthiness of programs and data installed in our systems and show the proper way to verify their integrity and authenticity. We will apply principle of least privileges for controlling the shared access given to different groups of users and system processes. On Amazon Cloud instances, we will use GnuPG software to generate public/private key pair for signing/verifying documents and open source software, and for encrypting documents. We will learn how to publish software, the related signature and release key on web server and publish public key to PGP key server for others to retrieve. We will learn Public Key Infrastructure (PKI) and Linux utility to serve as a CA for an organization, learn how to sign certificate request for clients or servers in secure email and web applications.الوحدات
Course Overview
1
Videos
- Course Overview
1
Readings
- Get help and meet other learners. Join your Community!
Vulnerability and Threat
1
Discussions
- Vulnerability and Threat
1
Videos
- Lesson 1. Vulnerabilities and Threats
1
Readings
- Cybersecurity Concepts
MOM: Method, Opportunity, Motive
1
Videos
- Method, Opportunity, and Motive
1
Readings
- M.O.M.
CIA: Confidentiality, Integrity, Availability
1
Peer Review
- Project 1.a Create AWS Account and AWS EC2 Instance
1
Videos
- Confidentiality, Integrity, and Availability
1
Readings
- C.I.A.
Risk, Risk Assessment and Method of Defense
1
Videos
- Risk, Risk Assessment and Method of Defense
1
Readings
- NIST RMF
Security Principles: Defense in Depth, Defense with Diversity, Cyber Resilience
1
Assignment
- Exam 1.1. Assess Cybersecurity Concepts and Security Principles Learned
1
Discussions
- Security Principles: Defense in Depth, Defense with Diversity, Cyber Resilience
1
Videos
- Security Principles: Defense in Depth, Defense with Diversity, Cyber Resilience
1
Readings
- Defense in Depth
Apply Principle of Least Privileges for Access Control
1
Peer Review
- Project 1b. Create Shared Project Policy and Implement with Access Control
1
Videos
- Apply Principle of Least Privileges for Access Control
1
Readings
- Apply Principle of Least Privileges for Access Control
Principle of Adequate Data Protection
1
Videos
- Principle of Adequate Data Protection
1
Readings
- Inside the Cyberattack that Shocked the US Government", by Brendan Koerner on OPM breach
In Software We Trust . Really?
1
Assignment
- Exam 1.2. Assess How to Protect Data Access and Verify Source of Trust
1
Videos
- In Software We Trust. Really?
1
Readings
- also good to add some additional reading beyond the slides
Sign Software with GPG
1
Videos
- Sign Software with GPG
1
Readings
- The GNU Privacy Handbook
Verify Software Integrity and Authenticity
1
Peer Review
- Project 1c. Use gpg to sign and verify open source software.
1
Videos
- Verify Software Integrity and Authenticity
1
Readings
- 1. Making and verifying signatures
Web of Trust
1
Assignment
- Exam 1.3. Assess the skill of using gpg to sign and verify software.
1
Videos
- Web of Trust
1
Readings
- How to send/receive encrypted email with GnuPG
Public Key Infrastructure
1
Videos
- Public Key Infrastructure
1
Readings
- Verisign
What are in a Certificate?
1
Videos
- What are in a Certificate?
1
Readings
- Secure Web Access
Be Your Own CA
1
Videos
- Being Your Own CA
Server Certificate and Installation
1
Peer Review
- Project 1d. Create, Sign and Install Web Server Certificate
1
Videos
- Server Certificate and Installation
1
Readings
- Server Certificates
Setup Client Certificate
1
Videos
- Setup Client Certificate
1
Readings
- Client Certificates
Client Server Mutual Authentication
1
Assignment
- Exam 1.4. Assess PKI Concepts and Certificates Creation/Signing with PKI
1
Videos
- Client Server Mutual Authentication
1
Readings
- Example of Mutual Authentication
Auto Summary
"Design and Analyze Secure Networked Systems" is a professional-level IT & Computer Science course on Coursera, led by an expert instructor. It covers essential cybersecurity concepts, risk management frameworks, and security design principles. Learners will analyze cyberattack incidents, manage vulnerabilities, and apply CIA security services. The course includes practical training on Amazon Cloud, GnuPG software, and Public Key Infrastructure (PKI). Lasting approximately 1020 minutes, it offers Starter and Professional subscription options, ideal for IT professionals aiming to enhance their cybersecurity skills.

Edward Chow