Give your career the gift of Coursera Plus with $160 off, billed annually. Save today.

University of Colorado System

Advanced System Security Topics

Edward Chow
Greg Williams

Instructors: Edward Chow

17,631 already enrolled

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
4.6

(346 reviews)

Beginner level
No prior experience required
Flexible schedule
Approx. 15 hours
Learn at your own pace
92%
Most learners liked this course
Gain insight into a topic and learn the fundamentals.
4.6

(346 reviews)

Beginner level
No prior experience required
Flexible schedule
Approx. 15 hours
Learn at your own pace
92%
Most learners liked this course

Details to know

Shareable certificate

Add to your LinkedIn profile

Assessments

16 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the Advanced System Security Design Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 4 modules in this course

In this module, we discuss the geoencryption techniques, the issues in the design and analysis of a Secure Enhanced Geolocking system for protected encrypted info with geolocking. We learn the web based implementation of an Secure Enhancing Geolocking system using Javascript with Google Map API and CryptoJS API.

What's included

3 videos3 readings4 assignments1 peer review1 discussion prompt

In this module, we learn the techniques for using WiFi or BLE signals to estimate the geolocation of a user. We also show the technique where the value added Software Defined Network services can be used to ensure the data are delivered through a designated path to the right location.

What's included

3 videos3 readings4 assignments

In this module, we discuss the definition of the authentication, the types of authentication credentials, and the authentication process and related requirements. we learn the Role Based Access Control, short for RBAC, which is an security approach to restricting system access to authorized users and to help specify organization's security policies reflecting its organizational structure. We use Docker Universal Control Plan and AWS IAM access control as examples for illustrating how RBAC simplifies the access control specification and management.

What's included

4 videos4 readings4 assignments

In this module, we discuss PMI Privilege Management Infrastructure for managing the authorization of privileges within a system. We use attribute certificates as an instrument to associate access rights of the resources/services in the system to the identities or roles of the intended users of the system. We compare the differences between the PKI, the public key infrastructure which is focused on identity management, with the PMI which is focused on the management of the privileges authorized for users. We discuss their difference usages for the access control of the system. We then present the XACML, which is an eXtensible Access Control Markup Language (XACML) for specifying policies. It is an attribute-based access control system (ABAC), where attributes associated with a user or action or resource are inputs into the decision of whether a given user may access a given resource in a particular way. An implementation of ABAC system using Sun’s XACML 2.0 Java reference implementation called ENFORCE is then presented as an example.

What's included

4 videos3 readings4 assignments

Instructors

Instructor ratings
4.3 (106 ratings)
Edward Chow
University of Colorado System
8 Courses124,083 learners

Offered by

Recommended if you're interested in Computer Security and Networks

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

Showing 3 of 346

4.6

346 reviews

  • 5 stars

    71.67%

  • 4 stars

    20.80%

  • 3 stars

    4.62%

  • 2 stars

    1.15%

  • 1 star

    1.73%

US
5

Reviewed on May 27, 2020

PP
4

Reviewed on May 6, 2020

PG
4

Reviewed on Nov 6, 2024

New to Computer Security and Networks? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions