Course Summary
This course delves into advanced system security topics such as malware analysis, vulnerability assessment, and intrusion detection. Students will gain practical experience through hands-on labs and will be equipped with the skills needed to secure modern computing systems.Key Learning Points
- Learn how to analyze malware and detect intrusions
- Gain practical experience through hands-on labs
- Understand the latest techniques used by cyber criminals and learn how to defend against them
Related Topics for further study
Learning Outcomes
- Understand advanced system security topics
- Gain practical experience through hands-on labs
- Be equipped with the skills needed to secure modern computing systems
Prerequisites or good to have knowledge before taking this course
- Basic understanding of computer networking and security
- Familiarity with programming concepts
Course Difficulty Level
AdvancedCourse Format
- Online self-paced course
- Hands-on labs
Similar Courses
- Cybersecurity Essentials
- Network Security
Related Education Paths
Notable People in This Field
- Bruce Schneier
- Eugene Kaspersky
Related Books
Description
In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. We show how Google Map and Web Crytpo
Outline
- Enhance Security with Geolocation
- Lesson 1.1 Location Based Encryption
- Lesson 4.2 Secure Enhanced Geolocking
- Ensure Data Delivery to Right Location
- Read the seminal location based encryption paper by Scott Logan and Dorothy E. Denning.
- Read SEG master project report by Ashish Korpe
- L1.1 Practice Quiz
- L1.2. Practice Quiz
- L1.3. Practice Quiz
- Quiz: M1 quiz
- Enhance Security with Network and Context Information
- Verify User Location Using WiFi System
- Location Verification Using Bluetooth Low Energy Devices
- Right Path Right Place Data Delivery
- Read the following papers related to Right Place Verification
- Read paper on using RSSI measurement of BLE devices for localization
- Read R2D2 paper on BLE location verification and SDN Data Path Confidence Analysis
- L2.1 Practice Quiz
- L2.2. Practice Quiz
- L2.3 Practice Quiz
- M2 quiz
- Authentication and Role Based Access Control
- Authentication Credentials
- Digital Certificate Creation
- Role Based Access Control (RBAC)
- RBAC Examples: Docker UCP and AWS IAM
- Watch OAuth presentation.
- Read how digital certificates are created for secure web access
- Reading assignments for RBAC.
- Read Docker and AWS RBAC support example.
- L3.1 Practice Quiz
- L3.2 Practice Quiz
- L3.3 Practice Quiz
- M3 Quiz
- Authorization and Attribute Based Access Control
- Privilege Management Infrastructure and Attribute Certificates
- eXtensible Access Control Markup Language (XACML)
- Attribute Based Access Control
- Enforce Testbed as an ABAC Example
- Read the following paper which utilize attribute certificates for secure information sharing.
- Read key sections of OASIS Standard XACML version 3.0
- Read Osama Khaleel's master thesis on Implementing an ABAC system with XACML 2.0
- L4.1 Practice Quiz
- L4.2 Practice Quiz
- Quiz L4.3 Practice Quiz
- M4 Quiz
Summary of User Reviews
The Advanced System Security Topics course on Coursera has received positive reviews from learners. Many users praised the course for its comprehensive coverage of advanced security topics. Overall, the course has been highly rated by learners.Key Aspect Users Liked About This Course
Comprehensive coverage of advanced security topicsPros from User Reviews
- In-depth and practical content
- High-quality lectures and assignments
- Engaging and knowledgeable instructors
- Good balance between theory and practice
- Useful for professionals in the field
Cons from User Reviews
- Some learners found the course challenging and time-consuming
- The course may not be suitable for beginners in cybersecurity
- Some users felt that the course lacked interaction with the instructors
- The course can be expensive for some learners
- Some learners found the course lacking in hands-on exercises