About this Specialization

3,288 recent views

100% online courses

Start instantly and learn at your own schedule.

Flexible Schedule

Set and maintain flexible deadlines.

Beginner Level

Basic computer science background

Approx. 2 months to complete

Suggested 7 hours/week

English

Subtitles: English

What you will learn

  • Understand basic cloud services and its application and how to work with AWS cloud computing resources.

  • Understand, analyze and evaluate DDoS attacks, detection and prevention techniques.

  • Understand and apply basic security and privacy in TOR network and blockchain systems.

  • Understand geo-location/attribute based access security and learn how to apply XACML in ABAC systems.

Skills you will gain

DDoS attacks and defensesCloud Computing SecuritySecurity and Privacy in Tor networkgeolocation-based access controlAttribute-Based Access Control

100% online courses

Start instantly and learn at your own schedule.

Flexible Schedule

Set and maintain flexible deadlines.

Beginner Level

Basic computer science background

Approx. 2 months to complete

Suggested 7 hours/week

English

Subtitles: English

How the Specialization Works

Take Courses

A Coursera Specialization is a series of courses that helps you master a skill. To begin, enroll in the Specialization directly, or review its courses and choose the one you'd like to start with. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. It’s okay to complete just one course — you can pause your learning or end your subscription at any time. Visit your learner dashboard to track your course enrollments and your progress.

Hands-on Project

Every Specialization includes a hands-on project. You'll need to successfully finish the project(s) to complete the Specialization and earn your certificate. If the Specialization includes a separate course for the hands-on project, you'll need to finish each of the other courses before you can start it.

Earn a Certificate

When you finish every course and complete the hands-on project, you'll earn a Certificate that you can share with prospective employers and your professional network.

how it works

There are 4 Courses in this Specialization

Course1

Course 1

Cloud Computing Security

4.7
stars
47 ratings
9 reviews
Course2

Course 2

DDoS Attacks and Defenses

4.6
stars
26 ratings
10 reviews
Course3

Course 3

Security and Privacy in TOR Network

4.4
stars
9 ratings
1 reviews
Course4

Course 4

Advanced System Security Topics

4.5
stars
8 ratings
4 reviews

Offered by

University of Colorado System logo

University of Colorado System

Reviews

TOP REVIEWS FROM ADVANCED SYSTEM SECURITY DESIGN

Frequently Asked Questions

  • Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.

  • This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.

  • 16 weeks.

  • Know one high level programming language, basic Unix system commands, and discrete mathematics in particular the number theory. knowledge of basic cybersecurity will help, e.g., those in the Fundamentals of Computer Network Security Specialization.

  • No. These four MOOCs are pretty much independent.

  • No. But It will help you prepare to complete related university cybersecurity classes.

  • You should be able to develop advanced secure software tools and high available systems using cloud computing, TOR, and web-based crypto API.

    You will know how to implement new security and privacy preserving data security features including how to ensure data is requested and delivered to a specific location and over a specific path.

    You will know how to perform secure system design and implementation, vulnerability analysis.

    You will have better KSAs in performing Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.

More questions? Visit the Learner Help Center.