About this Specialization

2,614 recent views
This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.
Shareable Certificate
Earn a Certificate upon completion
100% online courses
Start instantly and learn at your own schedule.
Flexible Schedule
Set and maintain flexible deadlines.
Beginner Level
Approx. 4 months to complete
Suggested 4 hours/week
English
Subtitles: English
Shareable Certificate
Earn a Certificate upon completion
100% online courses
Start instantly and learn at your own schedule.
Flexible Schedule
Set and maintain flexible deadlines.
Beginner Level
Approx. 4 months to complete
Suggested 4 hours/week
English
Subtitles: English

There are 4 Courses in this Specialization

Course1

Course 1

Cloud Computing Security

4.6
stars
63 ratings
11 reviews
Course2

Course 2

DDoS Attacks and Defenses

4.4
stars
55 ratings
18 reviews
Course3

Course 3

Security and Privacy in TOR Network

4.4
stars
23 ratings
2 reviews
Course4

Course 4

Advanced System Security Topics

4.4
stars
46 ratings
12 reviews

Offered by

University of Colorado System logo

University of Colorado System

Frequently Asked Questions

  • If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

  • Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.

  • Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project. Learn more.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. If you only want to read and view the course content, you can audit the course for free. If you cannot afford the fee, you can apply for financial aid.

  • This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.

  • 16 weeks.

  • Know one high level programming language, basic Unix system commands, and discrete mathematics in particular the number theory. knowledge of basic cybersecurity will help, e.g., those in the Fundamentals of Computer Network Security Specialization.

  • No. These four MOOCs are pretty much independent.

  • No. But It will help you prepare to complete related university cybersecurity classes.

  • You should be able to develop advanced secure software tools and high available systems using cloud computing, TOR, and web-based crypto API.

    You will know how to implement new security and privacy preserving data security features including how to ensure data is requested and delivered to a specific location and over a specific path.

    You will know how to perform secure system design and implementation, vulnerability analysis.

    You will have better KSAs in performing Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks.

More questions? Visit the Learner Help Center.