This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
Cyber Attack Countermeasures
This course is part of Introduction to Cyber Security Specialization
Instructor: Dr. Edward G. Amoroso
Sponsored by BIDAcademy
24,101 already enrolled
(694 reviews)
Skills you'll gain
- Enterprise Security
- Multi-Factor Authentication
- Network Security
- Threat Modeling
- Encryption
- Security Engineering
- Cybersecurity
- Data Security
- Information Systems Security
- Cryptography
- Identity and Access Management
- Cryptographic Protocols
- Public Key Cryptography Standards (PKCS)
- Authentications
- IT Security Architecture
- Key Management
- Public Key Infrastructure
Details to know
Add to your LinkedIn profile
7 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
This module provides an introduction to security modeling, foundational frameworks, and basic safeguard approaches.
What's included
12 videos6 readings3 assignments
This module introduces important protocols and techniques associated with advanced authentication processes.
What's included
10 videos6 readings1 assignment1 discussion prompt
This module introduces the foundations of conventional cryptography along with its practical application in Kerberos.
What's included
10 videos4 readings2 assignments
This module introduces the basics of public key cryptography including an overview of SSL and CA applications.
What's included
12 videos5 readings1 assignment1 peer review
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
694 reviews
- 5 stars
81.08%
- 4 stars
15.04%
- 3 stars
2.14%
- 2 stars
0.85%
- 1 star
0.85%
Showing 3 of 694
Reviewed on Jul 18, 2020
Great course , terms are very well explained by Prof.Ed Amoroso especially public key cryptography.
Reviewed on Mar 7, 2018
This is an excellent course with enough historical context for those who are not familiar with cybersecurity and good videos and current developments in the field.
Reviewed on Dec 30, 2019
The course is called Cyber Attacks Countermeasures, but really only focuses on Authentication and Encryption. Great class on those topics for someone new to cyber security!
Recommended if you're interested in Computer Science
Johns Hopkins University
University of Colorado System
SkillUp EdTech
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy