Acerca de este Curso
2,488 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 12 horas para completar

Sugerido: 7 hours/week...

Inglés (English)

Subtítulos: Inglés (English)
User
Los estudiantes que toman este Course son
  • Founders
  • Data Engineers
  • Data Scientists
  • Business Analysts
  • Software Engineers
User
Los estudiantes que toman este Course son
  • Founders
  • Data Engineers
  • Data Scientists
  • Business Analysts
  • Software Engineers

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 12 horas para completar

Sugerido: 7 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
4 horas para completar

Enhance Security with Geolocation

3 videos (Total 20 minutos), 2 lecturas, 5 cuestionarios
3 videos
Lesson 4.2 Secure Enhanced Geolocking8m
Ensure Data Delivery to Right Location2m
2 lecturas
Read the seminal location based encryption paper by Scott Logan and Dorothy E. Denning.1h
Read SEG master project report by Ashish Korpe1h
4 ejercicios de práctica
L1.1 Practice Quiz10m
L1.2. Practice Quiz15m
L1.3. Practice Quiz9m
Quiz: M1 quiz20m
Semana
2
3 horas para completar

Enhance Security with Network and Context Information

3 videos (Total 14 minutos), 3 lecturas, 4 cuestionarios
3 videos
Location Verification Using Bluetooth Low Energy Devices5m
Right Path Right Place Data Delivery3m
3 lecturas
Read the following papers related to Right Place Verification30m
Read paper on using RSSI measurement of BLE devices for localization30m
Read R2D2 paper on BLE location verification and SDN Data Path Confidence Analysis40m
4 ejercicios de práctica
L2.1 Practice Quiz9m
L2.2. Practice Quiz12m
L2.3 Practice Quiz9m
M2 quiz30m
Semana
3
3 horas para completar

Authentication and Role Based Access Control

4 videos (Total 24 minutos), 4 lecturas, 4 cuestionarios
4 videos
Digital Certificate Creation7m
Role Based Access Control (RBAC)4m
RBAC Examples: Docker UCP and AWS IAM5m
4 lecturas
Watch OAuth presentation.1h
Read how digital certificates are created for secure web access15m
Reading assignments for RBAC.20m
Read Docker and AWS RBAC support example.10m
4 ejercicios de práctica
L3.1 Practice Quiz8m
L3.2 Practice Quiz8m
L3.3 Practice Quiz8m
M3 Quiz30m
Semana
4
3 horas para completar

Authorization and Attribute Based Access Control

4 videos (Total 23 minutos), 3 lecturas, 4 cuestionarios
4 videos
eXtensible Access Control Markup Language (XACML)4m
Attribute Based Access Control4m
Enforce Testbed as an ABAC Example6m
3 lecturas
Read the following paper which utilize attribute certificates for secure information sharing.1h
Read key sections of OASIS Standard XACML version 3.020m
Read Osama Khaleel's master thesis on Implementing an ABAC system with XACML 2.020m
4 ejercicios de práctica
L4.1 Practice Quiz8m
L4.2 Practice Quiz16m
Quiz L4.3 Practice Quiz6m
M4 Quiz30m

Instructores

Avatar

Edward Chow

Professor
Computer Science
Avatar

Greg Williams

Lecturer
Department of Computer Science

Acerca de Sistema Universitario de Colorado

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Acerca de Programa especializado Advanced System Security Design

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks....
Advanced System Security Design

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.