This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.



Cyber Attack Countermeasures
This course is part of Introduction to Cyber Security Specialization

Instructor: Dr. Edward G. Amoroso
Access provided by CSU Sacramento, College of Business
25,807 already enrolled
(708 reviews)
Skills you'll gain
Details to know

Add to your LinkedIn profile
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
This module provides an introduction to security modeling, foundational frameworks, and basic safeguard approaches.
What's included
12 videos6 readings3 assignments
This module introduces important protocols and techniques associated with advanced authentication processes.
What's included
10 videos6 readings1 assignment1 discussion prompt
This module introduces the foundations of conventional cryptography along with its practical application in Kerberos.
What's included
10 videos4 readings2 assignments
This module introduces the basics of public key cryptography including an overview of SSL and CA applications.
What's included
12 videos5 readings1 assignment1 peer review
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career




Learner reviews
708 reviews
- 5 stars
81.24%
- 4 stars
14.95%
- 3 stars
2.11%
- 2 stars
0.84%
- 1 star
0.84%
Showing 3 of 708
Reviewed on Mar 7, 2018
This is an excellent course with enough historical context for those who are not familiar with cybersecurity and good videos and current developments in the field.
Reviewed on Mar 1, 2020
This course is exactly what I was looking for. Dr. Edward is absolutely phenomenal at explaining every single point with great detail and his unique style of teaching makes him one of a kind!
Reviewed on Feb 10, 2019
I like how Dr. Amoroso made some complicated concept sounds easy. I also love when he told us about the history of cyber security in this course.
Explore more from Computer Science
University of London
University of Colorado System
University of Colorado System
¹ Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.