课程信息

第 4 门课程(共 4 门)

100% 在线

立即开始,按照自己的计划学习。

可灵活调整截止日期

根据您的日程表重置截止日期。

初级

完成时间大约为12 小时

建议:7 hours/week...

英语(English)

字幕:英语(English)

第 4 门课程(共 4 门)

100% 在线

立即开始,按照自己的计划学习。

可灵活调整截止日期

根据您的日程表重置截止日期。

初级

完成时间大约为12 小时

建议:7 hours/week...

英语(English)

字幕:英语(English)

教学大纲 - 您将从这门课程中学到什么

1
完成时间为 4 小时

Enhance Security with Geolocation

In this module, we discuss the geoencryption techniques, the issues in the design and analysis of a Secure Enhanced Geolocking system for protected encrypted info with geolocking. We learn the web based implementation of an Secure Enhancing Geolocking system using Javascript with Google Map API and CryptoJS API.

...
3 个视频 (总计 20 分钟), 2 个阅读材料, 5 个测验
3 个视频
Lesson 4.2 Secure Enhanced Geolocking8分钟
Ensure Data Delivery to Right Location2分钟
2 个阅读材料
Read the seminal location based encryption paper by Scott Logan and Dorothy E. Denning.1小时
Read SEG master project report by Ashish Korpe1小时
4 个练习
L1.1 Practice Quiz10分钟
L1.2. Practice Quiz15分钟
L1.3. Practice Quiz9分钟
Quiz: M1 quiz20分钟
2
完成时间为 3 小时

Enhance Security with Network and Context Information

In this module, we learn the techniques for using WiFi or BLE signals to estimate the geolocation of a user. We also show the technique where the value added Software Defined Network services can be used to ensure the data are delivered through a designated path to the right location.

...
3 个视频 (总计 14 分钟), 3 个阅读材料, 4 个测验
3 个视频
Location Verification Using Bluetooth Low Energy Devices5分钟
Right Path Right Place Data Delivery3分钟
3 个阅读材料
Read the following papers related to Right Place Verification30分钟
Read paper on using RSSI measurement of BLE devices for localization30分钟
Read R2D2 paper on BLE location verification and SDN Data Path Confidence Analysis40分钟
4 个练习
L2.1 Practice Quiz9分钟
L2.2. Practice Quiz12分钟
L2.3 Practice Quiz9分钟
M2 quiz30分钟
3
完成时间为 3 小时

Authentication and Role Based Access Control

In this module, we discuss the definition of the authentication, the types of authentication credentials, and the authentication process and related requirements. we learn the Role Based Access Control, short for RBAC, which is an security approach to restricting system access to authorized users and to help specify organization's security policies reflecting its organizational structure. We use Docker Universal Control Plan and AWS IAM access control as examples for illustrating how RBAC simplifies the access control specification and management.

...
4 个视频 (总计 24 分钟), 4 个阅读材料, 4 个测验
4 个视频
Digital Certificate Creation7分钟
Role Based Access Control (RBAC)4分钟
RBAC Examples: Docker UCP and AWS IAM5分钟
4 个阅读材料
Watch OAuth presentation.1小时
Read how digital certificates are created for secure web access15分钟
Reading assignments for RBAC.20分钟
Read Docker and AWS RBAC support example.10分钟
4 个练习
L3.1 Practice Quiz8分钟
L3.2 Practice Quiz8分钟
L3.3 Practice Quiz8分钟
M3 Quiz30分钟
4
完成时间为 3 小时

Authorization and Attribute Based Access Control

In this module, we discuss PMI Privilege Management Infrastructure for managing the authorization of privileges within a system. We use attribute certificates as an instrument to associate access rights of the resources/services in the system to the identities or roles of the intended users of the system. We compare the differences between the PKI, the public key infrastructure which is focused on identity management, with the PMI which is focused on the management of the privileges authorized for users. We discuss their difference usages for the access control of the system. We then present the XACML, which is an eXtensible Access Control Markup Language (XACML) for specifying policies. It is an attribute-based access control system (ABAC), where attributes associated with a user or action or resource are inputs into the decision of whether a given user may access a given resource in a particular way. An implementation of ABAC system using Sun’s XACML 2.0 Java reference implementation called ENFORCE is then presented as an example.

...
4 个视频 (总计 23 分钟), 3 个阅读材料, 4 个测验
4 个视频
eXtensible Access Control Markup Language (XACML)4分钟
Attribute Based Access Control4分钟
Enforce Testbed as an ABAC Example6分钟
3 个阅读材料
Read the following paper which utilize attribute certificates for secure information sharing.1小时
Read key sections of OASIS Standard XACML version 3.020分钟
Read Osama Khaleel's master thesis on Implementing an ABAC system with XACML 2.020分钟
4 个练习
L4.1 Practice Quiz8分钟
L4.2 Practice Quiz16分钟
Quiz L4.3 Practice Quiz6分钟
M4 Quiz30分钟

讲师

Avatar

Edward Chow

Professor
Computer Science
Avatar

Greg Williams

Lecturer
Department of Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science

关于 科罗拉多大学系统

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

关于 Advanced System Security Design 专项课程

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control. With these techniques, learners will be better prepared to implement new security and privacy preserving data security features, to perform secure system design and implementation, vulnerability analysis, and Securely Provision (SP), Operate and Maintain (OM), Oversee and Govern (OV), Protect and Defend (PR), Analyze (AN), Collect and Operate (CO), and investigate (IN) tasks....
Advanced System Security Design

常见问题

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

还有其他问题吗?请访问 学生帮助中心