When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed. We introduce the hidden service provided by TOR and show how it can be denonymized. We will learn how to setup a hidden server to provide web service on AWS instance. We will also learn the best practices and operational security in providing the hidden services. We will learn how to manage the hidden server using Tor circuit and configure the web server not to reveal the software version information. We also show how it can be defended. To improve TOR’s performance, we discuss the cloud based TOR and their implementation.
By the end of this course, you should be able to utilize TOR browser to protect your privacy, set up hidden service on current interface that protect your servers and make it anonymous, you will choosing entry guards wisely since your adversary will try to attack them with DDoS traffic and force you to choose their relay as your entry and exit router. We will also learn the basic components of both censorship and censorship resistance systems, and the scheme deployed by these systems and their attacks.
In this module, we learn the basic concepts of Tor network for protecting the privacy of Tor users and how to use the Tor browser features to access the web sites while preserving the anonimity, change the entry guard and exit node of the Tor circuit, learn how to setup Tor software package on a Linux machine and start its service, and use torify to run network commands, such as ssh or curl command, but use a Tor circuit as an outgoing connection
What's included
4 videos4 readings3 assignments1 peer review
Show info about module content
4 videos•Total 24 minutes
Welcome to TOR Networking•2 minutes
TOR Basic Concepts•6 minutes
Realize Anonymity in TOR•5 minutes
Sniper Attack on TOR•11 minutes
4 readings•Total 43 minutes
TEDTalk: The Tor Project, protecting online anonimity•18 minutes
Get help and meet other learners in this course. Join your discussion forums!•5 minutes
Basic TOR Concepts•10 minutes
The Sniper Attacks: Anonymously deanonymizing and disabling the Tor network•10 minutes
3 assignments•Total 75 minutes
M1 Exam•15 minutes
L1.1 Practice Quiz•30 minutes
L1.2 Practice Quiz•30 minutes
1 peer review•Total 180 minutes
Maintain Anonymity with Tor Browser and Tor Software.•180 minutes
Hidden Service on TOR and their Attacks
Module 2•5 hours to complete
Module details
In this module, we learn how the hidden service architecture and protocol work, and how to set up the hidden server to provide network services on the Tor network without revealing the public IP address. We also learn the best practice of managing the hidden server anonymously and hide the version information of web server, OS, and installed software packages.
What's included
3 videos1 reading2 assignments1 peer review
Show info about module content
3 videos•Total 20 minutes
Hidden Services and Their Attacks•6 minutes
Defense Against Deanonymizing Attack•5 minutes
Cloud Based TOR•9 minutes
1 reading•Total 10 minutes
Setup procedures and Best Practices for Hosting Onion Services•10 minutes
2 assignments•Total 35 minutes
M2 Exam•20 minutes
L2.1 Practice Quiz•15 minutes
1 peer review•Total 240 minutes
Project 2b. Set up and verify a Tor hidden service.•240 minutes
Censorship Systems
Module 3•6 hours to complete
Module details
In this module we learn the basic components of the censorship systems, the censor model and the related challenges. We learn to define the censor's sphere of influence and sphere of visibility, and their impact on the techniques that can be deployed by the censorship systems. We will be able to describe the basic components of the censor's attack model, explain different fingerprinting methods and evaluating their strength and weakness. We will study different direct censorship method and learn the limitations imposed upon the range of censorship actions.
What's included
5 videos5 readings6 assignments
Show info about module content
5 videos•Total 35 minutes
Censor Model and Censorship Resistance System Survey Result•8 minutes
L3-2 CS6910 Censor Attack Model and Apparatus•11 minutes
L3-3 Fingerprinting•6 minutes
L3-4. Direct Censorship•5 minutes
L3.5. Range of Censorship Actions•6 minutes
5 readings•Total 50 minutes
Read Section 1 of "SoK: Making Sense of Censorship Resistance Systems"•10 minutes
Read censorship apparatus model and censor's attack model•10 minutes
L3-3. Fingerprinting.•10 minutes
L3.4. Direct Censorship•10 minutes
L3.5. Range of Censorship Actions•10 minutes
6 assignments•Total 270 minutes
M3 Exam•120 minutes
L1 Practice Quiz•30 minutes
L3.2 Practice Quiz•30 minutes
L3.3 Practice Quiz•30 minutes
L3.4 Practice Quiz•30 minutes
L3.5 Practice Quiz•30 minutes
Censorship Resistance System (CRS)
Module 4•6 hours to complete
Module details
In this module, we will learn the two main functional components of censorship resistance system (CRS) and explain the steps to establish the CRS communications. We will understand the operating requirements for establishing the CRS communications and learn the techniques for hiding information and avoid tracking using CRS channels. We will learn the basic CRS properties shared by CRS' and their purposes. We will comprehend different methods for obtaining CRS credentials and reduce faking/testing of them. We will be able to deploy different schemes for resisting active probing, identify different schemes to establish user trust. We will learn how to implement methods for evading censor detection and blocking. We will understand various methods for protecting publisher information and current open and active CRS research areas.
What's included
5 videos5 readings6 assignments
Show info about module content
5 videos•Total 28 minutes
L4.1. Overview of Censorship Resistance Systems•6 minutes
L4.2. CRS Properties•11 minutes
L4.3. Techniques for CRS Communication Establishment Phase•4 minutes
L4.4. Techniques for CRS Conversation Phase.•4 minutes
L4.5. Open CRS Research Areas•3 minutes
5 readings•Total 50 minutes
L4.1. Censorship Resistancde System Overview•10 minutes
L4.2. CRS Properties.•10 minutes
L4.3. Techniques for Communication Establishment Phase .•10 minutes
L4.4. Techniques for Conversation Phase•10 minutes
L4.5. Open Areas and Research Challenges.•10 minutes
6 assignments•Total 270 minutes
M4 Exam•120 minutes
L4.1 Practice Quiz•30 minutes
L4.2 Practice Quiz•30 minutes
L4.3 Practice Quiz•30 minutes
L4.4 Practice Quiz•30 minutes
L4.5 Practice Quiz•30 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructors
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.