This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.

Cyber Attack Countermeasures

Cyber Attack Countermeasures
This course is part of Introduction to Cyber Security Specialization

Instructor: Dr. Edward G. Amoroso
Access provided by Workforce Innovation Network (WIN) LLC
26,828 already enrolled
710 reviews
Skills you'll gain
Tools you'll learn
Details to know

Add to your LinkedIn profile
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 4 modules in this course
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
81.15%
- 4 stars
15.04%
- 3 stars
2.10%
- 2 stars
0.84%
- 1 star
0.84%
Showing 3 of 710
Reviewed on Aug 16, 2018
Great introduction to some common mechanisms, such as cryptography, which can be used to thwart cyber attacks.
Reviewed on Aug 12, 2020
Excellent!! You are a great teacher, and I learned a lot. I have already applied the knowledge gained to my business. Grazie mille.
Reviewed on Feb 10, 2019
I like how Dr. Amoroso made some complicated concept sounds easy. I also love when he told us about the history of cyber security in this course.
Explore more from Computer Science

New York University

University of London

LearnKartS
¹ Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.


