In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS instance. We will also learn the best practices and operational security in providing the hidden services. We will learn how to manage the hidden server using Tor circuit and configure the web server not to reveal the software version information. We also show how it can be defended. To improve TOR’s performance, we discuss the cloud based TOR and their implementation.
This course is part of the Advanced System Security Design Specialization
5,396 already enrolled
Offered By


About this Course
2,164 recent views
Flexible deadlines
Reset deadlines in accordance to your schedule.
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Coursera Labs
Includes hands on learning projects.
Learn more about Coursera Labs Course 3 of 4 in the
Intermediate Level
Approx. 22 hours to complete
English
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessFlexible deadlines
Reset deadlines in accordance to your schedule.
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Coursera Labs
Includes hands on learning projects.
Learn more about Coursera Labs Course 3 of 4 in the
Intermediate Level
Approx. 22 hours to complete
English
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessOffered by
Syllabus - What you will learn from this course
5 hours to complete
The Onion Routing (TOR)
5 hours to complete
4 videos (Total 24 min), 3 readings, 4 quizzes
5 hours to complete
Hidden Service on TOR and their Attacks
5 hours to complete
3 videos (Total 20 min), 1 reading, 3 quizzes
6 hours to complete
Censorship Systems
6 hours to complete
5 videos (Total 35 min), 5 readings, 6 quizzes
6 hours to complete
Censorship Resistance System (CRS)
6 hours to complete
5 videos (Total 28 min), 5 readings, 6 quizzes
Reviews
- 5 stars56.25%
- 4 stars28.12%
- 3 stars6.25%
- 1 star9.37%
TOP REVIEWS FROM SECURITY AND PRIVACY IN TOR NETWORK
by DNov 29, 2020
The course was excellent but I had some difficulty listening because of the pronunciations, other than that it was an excellent course.
by VMJun 28, 2020
Very good Course. I learned lots of new things about TOR ,Censorship and Censorship Resistance System (CRS). Thanks.
About the Advanced System Security Design Specialization

Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.