English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 59 Lessons (7h 34m) | 1.10 GB
Advanced Secure System Design and Analysis Skills. Apply state of art techniques and tools to design, analyze, and implement critical cyber systems
What you’ll learn
- Understand basic cloud services and its application and how to work with AWS cloud computing resources.
- Understand, analyze and evaluate DDoS attacks, detection and prevention techniques.
- Understand and apply basic security and privacy in TOR network and blockchain systems.
- Understand geo-location/attribute based access security and learn how to apply XACML in ABAC systems.
Skills you’ll gain
- Security Engineering
- Computer Networking
- Network Security
- Amazon Web Services
- Cloud Computing
- Cyberattacks
This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.
Applied Learning Project
With high available AWS load balancing cluster project, the learners apply the knowledge and skills of cloud computing security to demonstrate the abilities to create high available secure systems; with anonymous TOR browser and hidden server project, the learners apply the knowledge and skills of security and privacy in censorship resistance systems to protect the anonymity of the users or servers; with secure geo-coding project, the learners apply apply the knowledge and skills of RBAC/ABAC and context-aware access controls to implement secure data delivery service using web crypto and geolocaiton API.
Table of Contents
advanced-system-security-topics
enhance-security-with-geolocation
l1-1-proximity-based-encryption
1 lesson-1-1-location-based-encryption
2 read-the-seminal-location-based-encryption-paper-by-scott-logan-and-dorothy-e_instructions
3 get-help-and-meet-other-learners-in-this-course-join-your-discussion-forums_instructions
l1-2-secure-geo-coding
4 lesson-4-2-secure-enhanced-geolocking
5 read-seg-master-project-report-by-ashish-korpe_instructions
l1-3-ensure-the-data-delivery-to-right-location
6 ensure-data-delivery-to-right-location
enhance-security-with-network-and-context-information
l2-1-location-verification-using-wifi-system
7 verify-user-location-using-wifi-system
8 read-the-following-papers-related-to-right-place-verification_instructions
l2-2-location-verification-using-bluetooth-low-energy-devices
9 location-verification-using-bluetooth-low-energy-devices
10 read-paper-on-using-rssi-measurement-of-ble-devices-for-localization_instructions
l2-3-right-path-right-place-data-delivery-r2d2
11 right-path-right-place-data-delivery
12 read-r2d2-paper-on-ble-location-verification-and-sdn-data-path-confidence_instructions
authentication-and-role-based-access-control
l3-1-authentiation-credentials
13 authentication-credentials
14 watch-oauth-presentation_instructions
l3-2-digital-certificate-creation
15 digital-certificate-creation
16 read-how-digital-certificates-are-created-for-secure-web-access_instructions
l3-3-role-based-access-control-rbac
17 role-based-access-control-rbac
18 reading-assignments-for-rbac_instructions
l3-4-rbac-examples-docker-ucp-and-aws-iam
19 rbac-examples-docker-ucp-and-aws-iam
20 read-docker-and-aws-rbac-support-example_instructions
authorization-and-attribute-based-access-control
l4-1-privilege-management-infrastructure-and-attribute-certificates
21 privilege-management-infrastructure-and-attribute-certificates
22 read-the-following-paper-which-utilize-attribute-certificates-for-secure_instructions
l4-2-extensible-access-control-markup-language-xacml
23 extensible-access-control-markup-language-xacml
24 read-key-sections-of-oasis-standard-xacml-version-3-0_instructions
l4-3-attribute-based-access-control-abac
25 attribute-based-access-control
26 read-osama-khaleels-master-thesis-on-implementing-an-abac-system-with-xacml-2-0_instructions
l4-4-enforce-an-abac-prototype-for-controlling-web-and-network-resources
27 enforce-testbed-as-an-abac-example
cloud-computing-security
cloud-computing-basics
welcome-to-cloud-computing
28 welcome-to-cloud-computing
29 get-help-and-meet-other-learners-in-this-course-join-your-discussion-forums_instructions
cloud-computing-basic-aws-as-an-example-part-1
30 cloud-computing-with-aws
31 basic-cloud-service-models_instructions
cloud-computing-basic-aws-as-an-example-part-2
32 cloud-computing-basic-aws-as-an-example-part-2
33 cloud-service-interruption-and-their-impact_instructions
aws-cloud-ec2-service
34 aws-cloud-ec2-service
35 aws-ec2_instructions
sign-up-aws-account
36 aws-account-sign-up
37 aws-how-it-started-myth_instructions
aws-resource-planning
38 aws-resource-planning
39 aws-resource-features_AutoScalingGroup
40 aws-resource-features_instructions
secure-server-configuration-and-integrated-access-management
create-aws-ec2-instance
41 create-an-aws-instance
42 project-1a-create-aws-account-and-aws-ec2-instance_peer_assignment_instructions
43 microsoft-azure-an-aws-alternative_instructions
secure-access-to-aws-instance
44 secure-access-to-aws-instance
45 biomedical-cloud-computing-with-amazon-web-services_install-LAMP
46 biomedical-cloud-computing-with-amazon-web-services_instructions
configure-lamp-server-software-packages
47 configure-lamp-server-software-packages
create-iam-user-account-and-apply-iam-security-best-practices
48 identity-and-access-management
49 iam-beyond-compliance-article_instructions
aws-command-line-interface-aws-cli
50 aws-command-line-interface-aws-cli
51 aws-command-line-interface_instructions
use-aws-cli-to-clone-and-manage-instances
52 use-aws-cli-to-clone-and-manage-instances
utilize-route53-dns
setup-domain-with-aws-route53-service
53 setup-domain-with-route53
54 using-route-53-amazons-dns-service-for-the-cloud_instructions
register-dns-entries-with-route-53-service
55 register-dns-entries-on-route53
56 routing-traffic-to-an-amazon-ec2-instance_instructions
57 routing-traffic-to-an-amazon-ec2-instance_routing-to-ec2-instance
aws-load-balancer
aws-load-balancing-cluster
58 aws-load-balancing
59 elastic-load-balancing-deep-dive-and-best-practices_instructions
create-aws-load-balancing-cluster
60 create-aws-load-balancing-cluster
61 articles-on-issues-with-aws-elb_instructions
diagnose-aws-load-balancing-cluster-setup
62 diagnose-aws-load-balancing
63 detecting-issues-with-load-balancers_instructions
64 survey-of-techniques-and-challenges-for-load-balancing-in-public-cloud_instructions
peer-assignment-create-application-load-balancer
65 create-aws-load-balancers_peer_assignment_instructions
ddos-attacks-and-defense
ddos-attacks
welcome-to-distributed-denial-of-service-course
66 welcome-to-ddos-attack-and-defense-course
67 ddos-attack-cases_instructions
68 get-help-and-meet-other-learners-in-this-course-join-your-discussion-forums_instructions
history-of-ddos-attacks
69 history-of-ddos
70 history-of-ddos-from-digital-civil-disobedience-to-online-censorship_instructions
mirai-iot-malware-attack
71 mirai-ddos-attacks
72 breaking-down-mirai-an-iot-ddos-botnet-analysis_instructions
73 breaking-down-mirai-an-iot-ddos-botnet-analysis_malware-analysis-mirai-ddos-botnet
mirai-source-code-analysis-results
74 mirai-source-code-analysis
75 mirai-source-code-analysis_instructions
76 mirai-source-code-analysis_malware-analysis-mirai-ddos-botnet
ddos-defenses
ddos-defenses-challenges-and-the-appaches
77 ddos-defense-challenges-and-the-approaches
78 technical-overview-of-ddos-and-mitigation-techniques_instructions
major-ddos-defense-techniques
79 major-ddos-defense-techniques
80 survey-of-major-techniques-in-ddos-defense_instructions
intrusion-response-and-intrusion-tolerance
81 intrusion-response-and-intrusion-tolerance
82 intrusion-tolerance-literature_instructions
ddos-defense-systems-and-techniques
autonomous-anti-ddos-network-a2d2
83 autonomous-anti-ddos-network
84 a2d2-design-and-implementation_instructions
performance-of-cbq-rate-limit-on-ddos-traffic-types
85 performance-of-cbq-rate-limit-on-ddos-traffic
86 a2d2-ddos-defense-experiments_instructions
intrusion-tolerance-with-proxy-based-multipath-routing
scold-an-intrusion-tolerance-implementation
87 scold-an-intrusion-tolerance-implementation
88 intrusion-tolerant-architecture_instructions
89 intrusion-tolerant-eclipse-scada_instructions
scold-features-and-benefits
90 scold-features-and-benefits
91 on-proxy-server-based-multipath-connection_instructions
security-and-privacy-in-tor-network
the-onion-routing-tor
l1-1-introduction-to-tor-networking
92 welcome-to-tor-networking
93 tedtalk-the-tor-project-protecting-online-anonimity_instructions
94 get-help-and-meet-other-learners-in-this-course-join-your-discussion-forums_instructions
l1-2-tor-basic-concepts
95 tor-basic-concepts
96 basic-tor-concepts_instructions
l1-3-realizing-anonymity-in-tor
97 realize-anonymity-in-tor
l1-4-sniper-attack-on-tor
98 sniper-attack-on-tor
99 the-sniper-attacks-anonymously-deanonymizing-and-disabling-the-tor-network_instructions
hidden-service-on-tor-and-their-attacks
l2-1-hidden-service-and-their-attacks
100 hidden-services-and-their-attacks
101 setup-procedures-and-best-practices-for-hosting-onion-services_instructions
l2-2-defense-against-deanonymizing-attacks
102 defense-against-deanonymizing-attack
l2-3-creating-a-cloud-based-tor
103 cloud-based-tor
censorship-systems
l3-1-censor-model-and-censorship-resistance-systems
104 censor-model-and-censorship-resistance-system-survey-result
105 read-section-1-of-sok-making-sense-of-censorship-resistance-systems_instructions
l3-2-censor-attack-model-and-apparatus
106 l3-2-cs6910-censor-attack-model-and-apparatus
107 read-censorship-apparatus-model-and-censors-attack-model_instructions
l3-3-fingerprinting
108 l3-3-fingerprinting
109 l3-3-fingerprinting_instructions
l3-4-direct-censorship
110 l3-4-direct-censorship
111 l3-4-direct-censorship_instructions
l3-5-range-of-censorship-actions
112 l3-5-range-of-censorship-actions
113 l3-5-range-of-censorship-actions_instructions
censorship-resistance-system-crs
l4-1-overview-of-censorship-resistance-systems
114 l4-1-overview-of-censorship-resistance-systems
115 l4-1-censorship-resistancde-system-overview_instructions
l4-2-crs-properties
116 l4-2-crs-properties
117 l4-2-crs-properties_instructions
l4-3-techniques-for-crs-communication-establishment-phase
118 l4-3-techniques-for-crs-communication-establishment-phase
119 l4-3-techniques-for-communication-establishment-phase_instructions
l4-4-techniques-for-crs-conversation-phase
120 l4-4-techniques-for-crs-conversation-phase
121 l4-4-techniques-for-conversation-phase_instructions
l4-5-open-crs-research-areas
122 l4-5-open-crs-research-areas
123 l4-5-open-areas-and-research-challenges_instructions
Resolve the captcha to access the links!