About this Course
2,069 recent views

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 11 hours to complete

Suggested: 13 hours/week...

English

Subtitles: English
Learners taking this Course are
  • Data Scientists
  • Software Engineers
  • Engineers

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 11 hours to complete

Suggested: 13 hours/week...

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
5 hours to complete

The Onion Routing (TOR)

4 videos (Total 24 min), 3 readings, 4 quizzes
4 videos
TOR Basic Concepts6m
Realize Anonymity in TOR4m
Sniper Attack on TOR10m
3 readings
TEDTalk: The Tor Project, protecting online anonimity18m
Basic TOR Concepts10m
The Sniper Attacks: Anonymously deanonymizing and disabling the Tor network10m
3 practice exercises
L1.1 Practice Quiz8m
L1.2 Practice Quiz8m
M1 Exam15m
Week
2
5 hours to complete

Hidden Service on TOR and their Attacks

3 videos (Total 20 min), 1 reading, 3 quizzes
3 videos
Defense Against Deanonymizing Attack5m
Cloud Based TOR9m
1 reading
Setup procedures and Best Practices for Hosting Onion Services10m
2 practice exercises
L2.1 Practice Quiz15m
M2 Exam20m
Week
3
4 hours to complete

Censorship Systems

5 videos (Total 35 min), 5 readings, 6 quizzes
5 videos
L3-2 CS6910 Censor Attack Model and Apparatus10m
L3-3 Fingerprinting6m
L3-4. Direct Censorship4m
L3.5. Range of Censorship Actions5m
5 readings
Read Section 1 of "SoK: Making Sense of Censorship Resistance Systems"10m
Read censorship apparatus model and censor's attack model10m
L3-3. Fingerprinting.10m
L3.4. Direct Censorship10m
L3.5. Range of Censorship Actions10m
6 practice exercises
L1 Practice Quiz8m
L3.2 Practice Quiz8m
L3.3 Practice Quiz8m
L3.4 Practice Quiz8m
L3.5 Practice Quiz8m
M3 Exam2h
Week
4
4 hours to complete

Censorship Resistance System (CRS)

5 videos (Total 28 min), 5 readings, 6 quizzes
5 videos
L4.2. CRS Properties11m
L4.3. Techniques for CRS Communication Establishment Phase3m
L4.4. Techniques for CRS Conversation Phase.4m
L4.5. Open CRS Research Areas3m
5 readings
L4.1. Censorship Resistancde System Overview10m
L4.2. CRS Properties.10m
L4.3. Techniques for Communication Establishment Phase .10m
L4.4. Techniques for Conversation Phase10m
L4.5. Open Areas and Research Challenges.10m
6 practice exercises
L4.1 Practice Quiz8m
L4.2 Practice Quiz8m
L4.3 Practice Quiz8m
L4.4 Practice Quiz8m
L4.5 Practice Quiz4m
M4 Exam2h

Instructors

Avatar

Edward Chow

Professor
Computer Science
Avatar

Greg Williams

Lecturer
Department of Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

About the Advanced System Security Design Specialization

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks....
Advanced System Security Design

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.