This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
Cyber Attack Countermeasures
This course is part of Introduction to Cyber Security Specialization
Instructor: Dr. Edward G. Amoroso
Sponsored by InternMart, Inc
24,081 already enrolled
(694 reviews)
Skills you'll gain
- Enterprise Security
- Cryptographic Protocols
- Data Security
- Authentications
- Cybersecurity
- Encryption
- Cryptography
- Information Systems Security
- Security Engineering
- Public Key Infrastructure
- IT Security Architecture
- Identity and Access Management
- Key Management
- Threat Modeling
- Public Key Cryptography Standards (PKCS)
- Multi-Factor Authentication
- Network Security
Details to know
Add to your LinkedIn profile
7 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
This module provides an introduction to security modeling, foundational frameworks, and basic safeguard approaches.
What's included
12 videos6 readings3 assignments
This module introduces important protocols and techniques associated with advanced authentication processes.
What's included
10 videos6 readings1 assignment1 discussion prompt
This module introduces the foundations of conventional cryptography along with its practical application in Kerberos.
What's included
10 videos4 readings2 assignments
This module introduces the basics of public key cryptography including an overview of SSL and CA applications.
What's included
12 videos5 readings1 assignment1 peer review
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
694 reviews
- 5 stars
81.08%
- 4 stars
15.04%
- 3 stars
2.14%
- 2 stars
0.85%
- 1 star
0.85%
Showing 3 of 694
Reviewed on Jul 18, 2020
Great course , terms are very well explained by Prof.Ed Amoroso especially public key cryptography.
Reviewed on Oct 8, 2021
Instructor makes it easy to understand and keeps it interesting. Especially enjoy the talks and due credits to the unsung hero's of the early cyber security scene.
Reviewed on Mar 1, 2020
This course is exactly what I was looking for. Dr. Edward is absolutely phenomenal at explaining every single point with great detail and his unique style of teaching makes him one of a kind!
Recommended if you're interested in Computer Science
Cisco Learning and Certifications
University of Colorado System
University of Colorado System
The State University of New York
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy