Advanced System Security Design Specialization

Advanced System Security Design Specialization

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 59 Lessons (7h 34m) | 1.10 GB

Advanced Secure System Design and Analysis Skills. Apply state of art techniques and tools to design, analyze, and implement critical cyber systems

What you’ll learn

  • Understand basic cloud services and its application and how to work with AWS cloud computing resources.
  • Understand, analyze and evaluate DDoS attacks, detection and prevention techniques.
  • Understand and apply basic security and privacy in TOR network and blockchain systems.
  • Understand geo-location/attribute based access security and learn how to apply XACML in ABAC systems.

Skills you’ll gain

  • Security Engineering
  • Computer Networking
  • Network Security
  • Amazon Web Services
  • Cloud Computing
  • Cyberattacks

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.

Applied Learning Project
With high available AWS load balancing cluster project, the learners apply the knowledge and skills of cloud computing security to demonstrate the abilities to create high available secure systems; with anonymous TOR browser and hidden server project, the learners apply the knowledge and skills of security and privacy in censorship resistance systems to protect the anonymity of the users or servers; with secure geo-coding project, the learners apply apply the knowledge and skills of RBAC/ABAC and context-aware access controls to implement secure data delivery service using web crypto and geolocaiton API.

Table of Contents

advanced-system-security-topics

enhance-security-with-geolocation

l1-1-proximity-based-encryption
1 lesson-1-1-location-based-encryption
2 read-the-seminal-location-based-encryption-paper-by-scott-logan-and-dorothy-e_instructions
3 get-help-and-meet-other-learners-in-this-course-join-your-discussion-forums_instructions

l1-2-secure-geo-coding
4 lesson-4-2-secure-enhanced-geolocking
5 read-seg-master-project-report-by-ashish-korpe_instructions

l1-3-ensure-the-data-delivery-to-right-location
6 ensure-data-delivery-to-right-location

enhance-security-with-network-and-context-information

l2-1-location-verification-using-wifi-system
7 verify-user-location-using-wifi-system
8 read-the-following-papers-related-to-right-place-verification_instructions

l2-2-location-verification-using-bluetooth-low-energy-devices
9 location-verification-using-bluetooth-low-energy-devices
10 read-paper-on-using-rssi-measurement-of-ble-devices-for-localization_instructions

l2-3-right-path-right-place-data-delivery-r2d2
11 right-path-right-place-data-delivery
12 read-r2d2-paper-on-ble-location-verification-and-sdn-data-path-confidence_instructions

authentication-and-role-based-access-control

l3-1-authentiation-credentials
13 authentication-credentials
14 watch-oauth-presentation_instructions

l3-2-digital-certificate-creation
15 digital-certificate-creation
16 read-how-digital-certificates-are-created-for-secure-web-access_instructions

l3-3-role-based-access-control-rbac
17 role-based-access-control-rbac
18 reading-assignments-for-rbac_instructions

l3-4-rbac-examples-docker-ucp-and-aws-iam
19 rbac-examples-docker-ucp-and-aws-iam
20 read-docker-and-aws-rbac-support-example_instructions

authorization-and-attribute-based-access-control

l4-1-privilege-management-infrastructure-and-attribute-certificates
21 privilege-management-infrastructure-and-attribute-certificates
22 read-the-following-paper-which-utilize-attribute-certificates-for-secure_instructions

l4-2-extensible-access-control-markup-language-xacml
23 extensible-access-control-markup-language-xacml
24 read-key-sections-of-oasis-standard-xacml-version-3-0_instructions

l4-3-attribute-based-access-control-abac
25 attribute-based-access-control
26 read-osama-khaleels-master-thesis-on-implementing-an-abac-system-with-xacml-2-0_instructions

l4-4-enforce-an-abac-prototype-for-controlling-web-and-network-resources
27 enforce-testbed-as-an-abac-example

cloud-computing-security

cloud-computing-basics

welcome-to-cloud-computing
28 welcome-to-cloud-computing
29 get-help-and-meet-other-learners-in-this-course-join-your-discussion-forums_instructions

cloud-computing-basic-aws-as-an-example-part-1
30 cloud-computing-with-aws
31 basic-cloud-service-models_instructions

cloud-computing-basic-aws-as-an-example-part-2
32 cloud-computing-basic-aws-as-an-example-part-2
33 cloud-service-interruption-and-their-impact_instructions

aws-cloud-ec2-service
34 aws-cloud-ec2-service
35 aws-ec2_instructions

sign-up-aws-account
36 aws-account-sign-up
37 aws-how-it-started-myth_instructions

aws-resource-planning
38 aws-resource-planning
39 aws-resource-features_AutoScalingGroup
40 aws-resource-features_instructions

secure-server-configuration-and-integrated-access-management

create-aws-ec2-instance
41 create-an-aws-instance
42 project-1a-create-aws-account-and-aws-ec2-instance_peer_assignment_instructions
43 microsoft-azure-an-aws-alternative_instructions

secure-access-to-aws-instance
44 secure-access-to-aws-instance
45 biomedical-cloud-computing-with-amazon-web-services_install-LAMP
46 biomedical-cloud-computing-with-amazon-web-services_instructions

configure-lamp-server-software-packages
47 configure-lamp-server-software-packages

create-iam-user-account-and-apply-iam-security-best-practices
48 identity-and-access-management
49 iam-beyond-compliance-article_instructions

aws-command-line-interface-aws-cli
50 aws-command-line-interface-aws-cli
51 aws-command-line-interface_instructions

use-aws-cli-to-clone-and-manage-instances
52 use-aws-cli-to-clone-and-manage-instances

utilize-route53-dns

setup-domain-with-aws-route53-service
53 setup-domain-with-route53
54 using-route-53-amazons-dns-service-for-the-cloud_instructions

register-dns-entries-with-route-53-service
55 register-dns-entries-on-route53
56 routing-traffic-to-an-amazon-ec2-instance_instructions
57 routing-traffic-to-an-amazon-ec2-instance_routing-to-ec2-instance

aws-load-balancer

aws-load-balancing-cluster
58 aws-load-balancing
59 elastic-load-balancing-deep-dive-and-best-practices_instructions

create-aws-load-balancing-cluster
60 create-aws-load-balancing-cluster
61 articles-on-issues-with-aws-elb_instructions

diagnose-aws-load-balancing-cluster-setup
62 diagnose-aws-load-balancing
63 detecting-issues-with-load-balancers_instructions
64 survey-of-techniques-and-challenges-for-load-balancing-in-public-cloud_instructions

peer-assignment-create-application-load-balancer
65 create-aws-load-balancers_peer_assignment_instructions

ddos-attacks-and-defense

ddos-attacks

welcome-to-distributed-denial-of-service-course
66 welcome-to-ddos-attack-and-defense-course
67 ddos-attack-cases_instructions
68 get-help-and-meet-other-learners-in-this-course-join-your-discussion-forums_instructions

history-of-ddos-attacks
69 history-of-ddos
70 history-of-ddos-from-digital-civil-disobedience-to-online-censorship_instructions

mirai-iot-malware-attack
71 mirai-ddos-attacks
72 breaking-down-mirai-an-iot-ddos-botnet-analysis_instructions
73 breaking-down-mirai-an-iot-ddos-botnet-analysis_malware-analysis-mirai-ddos-botnet

mirai-source-code-analysis-results
74 mirai-source-code-analysis
75 mirai-source-code-analysis_instructions
76 mirai-source-code-analysis_malware-analysis-mirai-ddos-botnet

ddos-defenses

ddos-defenses-challenges-and-the-appaches
77 ddos-defense-challenges-and-the-approaches
78 technical-overview-of-ddos-and-mitigation-techniques_instructions

major-ddos-defense-techniques
79 major-ddos-defense-techniques
80 survey-of-major-techniques-in-ddos-defense_instructions

intrusion-response-and-intrusion-tolerance
81 intrusion-response-and-intrusion-tolerance
82 intrusion-tolerance-literature_instructions

ddos-defense-systems-and-techniques

autonomous-anti-ddos-network-a2d2
83 autonomous-anti-ddos-network
84 a2d2-design-and-implementation_instructions

performance-of-cbq-rate-limit-on-ddos-traffic-types
85 performance-of-cbq-rate-limit-on-ddos-traffic
86 a2d2-ddos-defense-experiments_instructions

intrusion-tolerance-with-proxy-based-multipath-routing

scold-an-intrusion-tolerance-implementation
87 scold-an-intrusion-tolerance-implementation
88 intrusion-tolerant-architecture_instructions
89 intrusion-tolerant-eclipse-scada_instructions

scold-features-and-benefits
90 scold-features-and-benefits
91 on-proxy-server-based-multipath-connection_instructions

security-and-privacy-in-tor-network

the-onion-routing-tor

l1-1-introduction-to-tor-networking
92 welcome-to-tor-networking
93 tedtalk-the-tor-project-protecting-online-anonimity_instructions
94 get-help-and-meet-other-learners-in-this-course-join-your-discussion-forums_instructions

l1-2-tor-basic-concepts
95 tor-basic-concepts
96 basic-tor-concepts_instructions

l1-3-realizing-anonymity-in-tor
97 realize-anonymity-in-tor

l1-4-sniper-attack-on-tor
98 sniper-attack-on-tor
99 the-sniper-attacks-anonymously-deanonymizing-and-disabling-the-tor-network_instructions

hidden-service-on-tor-and-their-attacks

l2-1-hidden-service-and-their-attacks
100 hidden-services-and-their-attacks
101 setup-procedures-and-best-practices-for-hosting-onion-services_instructions

l2-2-defense-against-deanonymizing-attacks
102 defense-against-deanonymizing-attack

l2-3-creating-a-cloud-based-tor
103 cloud-based-tor

censorship-systems

l3-1-censor-model-and-censorship-resistance-systems
104 censor-model-and-censorship-resistance-system-survey-result
105 read-section-1-of-sok-making-sense-of-censorship-resistance-systems_instructions

l3-2-censor-attack-model-and-apparatus
106 l3-2-cs6910-censor-attack-model-and-apparatus
107 read-censorship-apparatus-model-and-censors-attack-model_instructions

l3-3-fingerprinting
108 l3-3-fingerprinting
109 l3-3-fingerprinting_instructions

l3-4-direct-censorship
110 l3-4-direct-censorship
111 l3-4-direct-censorship_instructions

l3-5-range-of-censorship-actions
112 l3-5-range-of-censorship-actions
113 l3-5-range-of-censorship-actions_instructions

censorship-resistance-system-crs

l4-1-overview-of-censorship-resistance-systems
114 l4-1-overview-of-censorship-resistance-systems
115 l4-1-censorship-resistancde-system-overview_instructions

l4-2-crs-properties
116 l4-2-crs-properties
117 l4-2-crs-properties_instructions

l4-3-techniques-for-crs-communication-establishment-phase
118 l4-3-techniques-for-crs-communication-establishment-phase
119 l4-3-techniques-for-communication-establishment-phase_instructions

l4-4-techniques-for-crs-conversation-phase
120 l4-4-techniques-for-crs-conversation-phase
121 l4-4-techniques-for-conversation-phase_instructions

l4-5-open-crs-research-areas
122 l4-5-open-crs-research-areas
123 l4-5-open-areas-and-research-challenges_instructions

Homepage